scholarly journals Consumer Privacy in a Behavioral World

Author(s):  
Ignacio Cofone ◽  
Adriana Robertson

In 2017, Congress repealed the FCC’s latest attempt to protect consumer privacy on the internet and allowed ISPs to continue to track their users’ online behavior. We evaluate the impact of this decision on consumer privacy in light of biased beliefs and information overload. We do so through a well-documented behavioral bias: Non-belief in the Law of Large Numbers. In doing so, we provide a framework for deciding why and how to protect consumer privacy. We then suggest private law and regulatory solutions to do so in a more effective way than either the current or the now-repealed regime.

2018 ◽  
Vol 71 (1) ◽  
pp. 126-161
Author(s):  
Jonathan Bendor ◽  
Jacob N. Shapiro

AbstractHistorians and some scholars of international relations have long argued that historical contingencies play a critical role in the evolution of the international system, but have not explained whether they do so to a greater extent than in other domains or why such differences may exist. The authors address these lacunae by identifying stable differences between war and other policy domains that render the evolution of the international system more subject to chance events than those other domains. The selection environment of international politics has produced tightly integrated organizations (militaries) as the domain’s key players to a much greater degree than other policy domains. Because there are few players, no law of large numbers holds, and because militaries are tightly integrated, microshocks can reverberate up to macro-organizational levels. The anarchic character of the international system amplifies the impact of these shocks. The authors explore these phenomena in a range of historical examples.


Stalking ◽  
2007 ◽  
Author(s):  
Graham D. Glancy ◽  
Alan W. Newman

Cyberstalking involves the use of the Internet or other electronic communication to stalk another person. Already common, it is likely to become more common as the use of the Internet continues to grow. The characteristics of online stalkers and their victims have some differences from those of the offline stalker. Mullen, Pathé, Purcell, and Stuart’s (1999) classification may apply to cyberstalkers except for the apparently common phenomenon of child luring that may be a new category. The methods of cyberstalking, as described in this chapter, are particularly ingenious. We know little about the effect on victims, but postulate that it is similar to offline stalking. We make some suggestions that may prevent cyberstalking, as well as offer some steps to bear in mind once cyberstalking occurs. The proliferation of personal computers with Internet access in the last decade has raised concerns about a new phenomenon known as cyberstalking. The Internet can be used to annoy and harass large numbers of victims in a generic manner by disseminating computer viruses, Internet scams, and “spamming” people with unsolicited e-mail. In 1999 Janet Reno, the attorney general of the United States, defined cyberstalking as the use of the Internet, e-mail, or other electronic communications devices to stalk another person (Reno, 1999). Barak (2005) looked at the issue of sexual harassment on the Internet. He characterizes cyberstalking as one type of sexual coercion. He notes that online behavior is characterized by disinhibition, openness, venture, and bravado—an atmosphere characterized by typical masculine attitudes. He argues that the lack of legal boundaries or enforcement vehicles encourage people to do what they would not have done in offline situations. He notes the near impossibility of implementation of legal procedures on a large scale. In this chapter we will discuss what is known about the prevalence of this phenomenon, the types of cyberstalking, and what is known about the perpetrators. In addition, we will generate some hypotheses about the comparison between online and offline stalkers. We will also discuss the effects on victims and current thoughts and resources for dealing with cyberstalking.


2021 ◽  
Vol 5 (1) ◽  
pp. 1-18
Author(s):  
Stefan Koos

Technologic evolutions of the last two decades, such as the development of the  internet, had a strong disruptive effect to the society and the economy. However, because of the flexible concepts of the civil law codifications a disruptive effect in the private law until now did not exist. Especially the legal consequences  of the internet were integrated into the private law without bigger categorial or structural changes. This applies equally to most of the cases of the use of artificial intelligence (AI) in recent times. With more advanced development of AI-systems, though, it may not be possible anymore to apply the traditional terms of the private law to the use of AI without leaving the constitutional law background of the private law. This article discusses the impact of the use of a future advanced independent AI on the concept of the private autonomy in the contract law. Furthermore, it gives an overview on the new legislative approach of a human centric use of AI in the European Union. 


Author(s):  
Oliver Y. Chén ◽  
Huy Phan ◽  
Guy Nagels ◽  
Maarten de Vos

A century ago, Sir R.A. Fisher introduced for the first time the concept of variance in biological studies. In this paper, we present a few new, modified, or integrated perspectives of variance that we feel would contribute to future thinking and practice of data science. We do so by focusing on brain and behavioral data, through which we hope one could extrapolate the discussions to other fields and data. Specifically: (1) We define different types of variation. (2) We demonstrate that both classic regression models and advanced statistical methods can be viewed as variance-decomposition methods. (3) We make a distinction between innate and acquired variability, linked through Bayesian updating. (4) We review and illustrate how to extract information from high-dimensional data and how to visualize them. Additionally, we introduce the Neural Law of Large Numbers. (5) We discuss the statistical basis for association, explanation, prediction, and causation, and recommend a strategy that may be useful to check if association-based findings can be raised to causal discoveries. Taken together, to understand the variation of data, one needs creative statistical thinking. Meanwhile, by incorporating insights learned from data, one can begin to design better statistical apparatuses.


Author(s):  
Samantha Grant

Because the internet makes it economical to do so, many American companies have sent their customer service jobs overseas. Workers in these outsourced jobs often have access to personal financial information of American citizens. Recent identity thefts, both in America and abroad, highlight the need for laws mandating tighter security by the companies that hold and trade personal information. This paper explores American legislation attempting to deal with identity theft crime as well as parallel laws in India, where many of the outsourced jobs are located. Furthermore, this paper suggests that any federal legislation ought not to preempt state law, as California law is currently protecting consumer privacy stronger than proposed legislation would.


2020 ◽  
Vol 6 (2) ◽  
pp. 25-34
Author(s):  
Barbara Da Rosa Lazarotto

This article aims to point out the main suggestions of regularisation by the European Union of disinformation in the internet. To do so, initially, we will point out what disinformation is and how it became popular through social media. Afterwards, some suggestions for regularization will be listed, along with an assessment of the impact this could have on the fundamental rights of citizens.


Crisis ◽  
2017 ◽  
Vol 38 (3) ◽  
pp. 207-209 ◽  
Author(s):  
Florian Arendt ◽  
Sebastian Scherr

Abstract. Background: Research has already acknowledged the importance of the Internet in suicide prevention as search engines such as Google are increasingly used in seeking both helpful and harmful suicide-related information. Aims: We aimed to assess the impact of a highly publicized suicide by a Hollywood actor on suicide-related online information seeking. Method: We tested the impact of the highly publicized suicide of Robin Williams on volumes of suicide-related search queries. Results: Both harmful and helpful search terms increased immediately after the actor's suicide, with a substantial jump of harmful queries. Limitations: The study has limitations (e.g., possible validity threats of the query share measure, use of ambiguous search terms). Conclusion: Online suicide prevention efforts should try to increase online users' awareness of and motivation to seek help, for which Google's own helpline box could play an even more crucial role in the future.


Sign in / Sign up

Export Citation Format

Share Document