University of Minnesota M.A. thesis. May 2015. Major: Mass Communication. Advisor: Amy Sanders. 1 computer file (PDF); v, 89 pages.This thesis explores the harm that occurs to individuals whose data has been exposed to a third party as a result of a data breach, but which has not been used to commit identity theft or fraud. The vast majority of Americans disclose their Personally Identifiable Information (PII) to private entities almost everyday. Yet this information is increasingly insecure in those hands, as a recent rise in data breaches makes evident. Law responded to this problem, in part, by criminalizing hacking and identity theft. But have individuals suffered harm when their data has been made vulnerable? Where the hacker has not ...
I explain why and how much criminals deserve to be punished on the basis of a novel theory of puniti...
- Divulgação dos SUMÁRIOS das obras recentemente incorporadas ao acervo da Biblioteca Ministro Oscar...
Internet of Things (“IoT”) products generate a wealth of data about consumers that was never before ...
Privacy often bears an assumed connection to political freedom, but the nature of that connection is...
Surveillance studies suffer from a near-total lack of empirical data, partially due to the highly se...
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self ...
abstract: The current study examines the role that context plays in hackers' perceptions of the risk...
Purpose: The purpose of this research is to examine the relationship between\ud misanthropy and crim...
abstract: In recent years, the use of biologically based (neurological, neuropsychological, genetic)...
Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consu...
Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consu...
The right to privacy has been central to democratic society since its inception. In turbulent times...
I explain why and how much criminals deserve to be punished on the basis of a novel theory of puniti...
The clinical swallowing evaluation (CSE) is a non-instrumental exam that informs speech-language pat...
Significant research has been conducted exploring many aspects of academic integrity including the r...
I explain why and how much criminals deserve to be punished on the basis of a novel theory of puniti...
- Divulgação dos SUMÁRIOS das obras recentemente incorporadas ao acervo da Biblioteca Ministro Oscar...
Internet of Things (“IoT”) products generate a wealth of data about consumers that was never before ...
Privacy often bears an assumed connection to political freedom, but the nature of that connection is...
Surveillance studies suffer from a near-total lack of empirical data, partially due to the highly se...
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self ...
abstract: The current study examines the role that context plays in hackers' perceptions of the risk...
Purpose: The purpose of this research is to examine the relationship between\ud misanthropy and crim...
abstract: In recent years, the use of biologically based (neurological, neuropsychological, genetic)...
Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consu...
Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consu...
The right to privacy has been central to democratic society since its inception. In turbulent times...
I explain why and how much criminals deserve to be punished on the basis of a novel theory of puniti...
The clinical swallowing evaluation (CSE) is a non-instrumental exam that informs speech-language pat...
Significant research has been conducted exploring many aspects of academic integrity including the r...
I explain why and how much criminals deserve to be punished on the basis of a novel theory of puniti...
- Divulgação dos SUMÁRIOS das obras recentemente incorporadas ao acervo da Biblioteca Ministro Oscar...
Internet of Things (“IoT”) products generate a wealth of data about consumers that was never before ...