K. A. Taipale

Center for Advanced Studies in Science and Technology Policy

Executive Director

100 Hudson Street

10th Floor E

New York, NY 10013-2882

United States

SCHOLARLY PAPERS

14

DOWNLOADS
Rank 3,640

SSRN RANKINGS

Top 3,640

in Total Papers Downloads

8,659

CITATIONS
Rank 40,180

SSRN RANKINGS

Top 40,180

in Total Papers Citations

4

Scholarly Papers (14)

1.

Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data

Columbia Science and Technology Law Review, Vol. 5, No. 2, December 2003
Number of pages: 83 Posted: 02 Jul 2004
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 1,643 (7,061)
Citation 2

Abstract:

Data mining, domestic security, homeland security, privacy

2.

Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd

Yale Journal of Law and Technology, Vol. 7, No. 123, December 2004
Number of pages: 79 Posted: 11 Oct 2004
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 1,534 (8,085)

Abstract:

Technology, security, privacy, law enforcement, domestic security, national security, surveillance, collection, identification, information sharing, data analaysis, data mining

3.

Cyber-Deterrence

LAW, POLICY AND TECHNOLOGY: CYBERTERRORISM, INFORMATION, WARFARE, DIGITAL AND INTERNET IMMOBILIZATION, IGI Global, 2010
Number of pages: 62 Posted: 01 Feb 2009 Last Revised: 05 Aug 2014
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 1,203 (9,902)
Citation 1

Abstract:

cyber-deterrence, cyber-war, cyber-attack, cybercrime, information warfare, critical infrastructure protection

4.

Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance

NYU Review of Law & Security, No. 7, Supl. Bull. on L. & Sec., Spring 2006
Number of pages: 6 Posted: 20 Mar 2006
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 1,015 (15,333)

Abstract:

foreign intelligence, surveillance, FISA, data mining, wiretaps

5.

Secondary Liability on the Internet: Towards a Performative Standard for Constitutive Responsibility.

Center for Advanced Studies Working Paper No. 04-2003
Number of pages: 26 Posted: 29 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 753 (23,672)
Citation 1

Abstract:

internet, secondary liability, third party liability, ISP liability, constitutive liability, performative liability

6.

Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet

National Strategy Forum Review, Vol. 16, Summer 2007
Number of pages: 8 Posted: 18 May 2007
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 603 (32,226)

Abstract:

information warfare, information operations, counterterrorism, use of Internet by terrorists

7.

Internet and Computer Crime: System Architecture as Crime Control

Center for Advanced Studies Working Paper No. 03-2003
Number of pages: 11 Posted: 26 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 518 (37,701)

Abstract:

online crime control, cybercrime, internet service provider liability, Internet regulation, information system architecture

8.

The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance

Yale Journal of Law and Technology, Vol. 9, Spring 2007
Number of pages: 34 Posted: 30 Jan 2007
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 512 (41,454)

Abstract:

foreign intelligence surveillance, FISA, FISC, counterterrorism, electronic surveillance

9.

Information Technology as Agent of Change In Environmental Policy

Center for Advanced Studies Working Paper No. 05-2003
Number of pages: 73 Posted: 29 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 169 (143,986)

Abstract:

environment, environmental regulation, market mechanisms, economic incentive mechanisms, information technology,

10.

Free Speech, Semiosis and Cyberspace: The Hyperlink as Nexus to Felicity

Center for Advanced Studies Working Paper No. 02-2003
Number of pages: 27 Posted: 29 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 141 (162,280)

Abstract:

internet, free speech, semiotics, speech act theory, first amendment

11.

Power to the Edge? New Threats, New Responses

AMERICA'S SECURITY ROLE IN A CHANGING WORLD: A GLOBAL STRATEGIC ASSESSMENT 2009, National Defense University, 2009
Posted: 18 Sep 2008 Last Revised: 19 Feb 2009
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy

Abstract:

national security, non state threats

12.

Transnational Intelligence and Surveillance: Security Envelopes, Trusted Systems, and the Panoptic Global Security State

Center for Advanced Studies Working Paper No. 05:06:01
Posted: 07 Jun 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy

Abstract:

Transnational security, intelligence, surveillance, terrorism, security envelopes, trusted systems, freedom

13.

Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties

21st CENTURY INFORMATION TECHNOLOGIES AND ENABLING POLICIES FOR COUNTER-TERRORISM, Robert Popp and John Yen, eds., IEEE Press, 2005
Posted: 29 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy

Abstract:

information sharing, counterterrorism, privacy, civil liberties, national security

14.

Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism

Posted: 14 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy

Abstract:

counterterrorism, information warfare, information operations, information flow, national security, domestic security, law enforcement