Ease of information flow is both the boon and the bane of large-scale, decentralized systems like the World Wide Web. For all the benefits and opportunities brought by the information revolution, with that same revolution have come the challenges of inappropriate use. Such excesses and abuses in the use of information are most commonly viewed through the lens of information security. This paper argues that debates over online privacy, copyright, and information policy questions have been overly dominated by the access restriction perspective. Our alternative is to design systems that are oriented toward information accountability and appropriate use, rather than information security and access restriction. Our goal is to extend the Web ar...
The Computer Fraud and Abuse Act (CFAA) was originally enacted in 1984 as a criminal statute to addr...
Advances in technology are shifting the focus of privacy concerns; commonplace transactions can gene...
A consensus seems to be emerging that algorithmic governance is too opaque and ought to be made more...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Attempts to address issues of personal privacy in a world of computerized databases and information ...
Attempts to address issues of personal privacy in a world of computerized databases and information ...
Adequately protecting informational privacy in an increasingly interconnected world poses two proble...
Information accountability is seen as a mode of usage control on the Web. Due to its many dimensions...
Information accountability is seen as a mode of usage control on the Web. Due to its many dimensions...
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privac...
This article argues that the gathering of open source intelligence, such as through messages on soc...
This paper examines how the conflict between information technology and information privacy is socia...
This perspective paper discusses challenges and risks of the information age, and the implications f...
ICT is becoming a prominent part of healthcare delivery but brings with it information privacy conce...
Posting privacy policies has become a popular practice with businesses as they seek to shield themse...
The Computer Fraud and Abuse Act (CFAA) was originally enacted in 1984 as a criminal statute to addr...
Advances in technology are shifting the focus of privacy concerns; commonplace transactions can gene...
A consensus seems to be emerging that algorithmic governance is too opaque and ought to be made more...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Attempts to address issues of personal privacy in a world of computerized databases and information ...
Attempts to address issues of personal privacy in a world of computerized databases and information ...
Adequately protecting informational privacy in an increasingly interconnected world poses two proble...
Information accountability is seen as a mode of usage control on the Web. Due to its many dimensions...
Information accountability is seen as a mode of usage control on the Web. Due to its many dimensions...
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privac...
This article argues that the gathering of open source intelligence, such as through messages on soc...
This paper examines how the conflict between information technology and information privacy is socia...
This perspective paper discusses challenges and risks of the information age, and the implications f...
ICT is becoming a prominent part of healthcare delivery but brings with it information privacy conce...
Posting privacy policies has become a popular practice with businesses as they seek to shield themse...
The Computer Fraud and Abuse Act (CFAA) was originally enacted in 1984 as a criminal statute to addr...
Advances in technology are shifting the focus of privacy concerns; commonplace transactions can gene...
A consensus seems to be emerging that algorithmic governance is too opaque and ought to be made more...