A Legal Review on the Protection of the Internet Privacy Rights in China

2021 ◽  
Vol 93 ◽  
pp. 327-348
Author(s):  
Seon Yeong Hwang ◽  
Liu Zhi Hua
2021 ◽  
pp. 1-31
Author(s):  
Sarah E. Lageson ◽  
Elizabeth Webster ◽  
Juan R. Sandoval

Digitization and the release of public records on the Internet have expanded the reach and uses of criminal record data in the United States. This study analyzes the types and volume of personally identifiable data released on the Internet via two hundred public governmental websites for law enforcement, criminal courts, corrections, and criminal record repositories in each state. We find that public disclosures often include information valuable to the personal data economy, including the full name, birthdate, home address, and physical characteristics of arrestees, detainees, and defendants. Using administrative data, we also estimate the volume of data disclosed online. Our findings highlight the mass dissemination of pre-conviction data: every year, over ten million arrests, 4.5 million mug shots, and 14.7 million criminal court proceedings are digitally released at no cost. Post-conviction, approximately 6.5 million current and former prisoners and 12.5 million people with a felony conviction have a record on the Internet. While justified through public records laws, such broad disclosures reveal an imbalance between the “transparency” of data releases that facilitate monitoring of state action and those that facilitate monitoring individual people. The results show how the criminal legal system increasingly distributes Internet privacy violations and community surveillance as part of contemporary punishment.


2009 ◽  
pp. 284-299 ◽  
Author(s):  
Andy Chiou

In this chapter, the authors will briefly discuss some cross cultural concerns regarding Internet privacy. The authors believe that due to the cross cultural nature of the Internet itself, different cultures will tend to result in different concerns regarding Internet privacy. As such, there is no single system of protecting Internet privacy that may be suitable for all cultures. The authors also utilize focus groups from various countries spanning Asia and the United States to discover the differences between cultures. Hopefully an understanding of such differences will aid in future research on Internet privacy to take a more culture sensitive approach.


2008 ◽  
pp. 1360-1365
Author(s):  
Tziporah Stern

People have always been concerned about protecting personal information and their right to privacy. It is an age-old concern that is not unique to the Internet. People are concerned with protecting their privacy in various environments, including healthcare, the workplace and e-commerce. However, advances in technology, the Internet, and community networking are bringing this issue to the forefront. With computerized personal data files: a. retrieval of specific records is more rapid; b. personal information can be integrated into a number of different data files; and c. copying, transporting, collecting, storing, and processing large amounts of information are easier.


2021 ◽  
pp. 77-91
Author(s):  
Kieron O’Hara

This chapter describes the Brussels Bourgeois Internet. The ideal consists of positive, managed liberty where rights of others are respected, as in the bourgeois public space, where liberty follows only when rights are secured. The exemplar of this approach is the European Union, which uses administrative means, soft law, and regulation to project its vision across the Internet. Privacy and data protection have become the most emblematic struggles. Under the Data Protection Directive of 1995, the European Union developed data-protection law and numerous privacy rights, including a right to be forgotten, won in a case against Google Spain in 2014, the arguments about which are dissected. The General Data Protection Regulation (GDPR) followed in 2018, amplifying this approach. GDPR is having the effect of enforcing European data-protection law on international players (the ‘Brussels effect’), while the European Union over the years has developed unmatched expertise in data-protection law.


Author(s):  
Patrice Seuwou ◽  
Vincent F. Adegoke

The opportunities offered by digital technology are enormous. The global social and economic system is being reconfigured at an incredible rate. Connectivity is increasingly reshaping our world and redefining the way we interact with our environment. The rise of digital technologies is transforming almost every aspect of modern life. More and more of our interactions are mediated by machines. Along with the rapid evolution comes the risks, threats, and vulnerabilities in the system for those who plan to exploit it. In this chapter, firstly, the authors explore the role of 5G, big data, the internet of things (IoT), artificial intelligence (AI), autonomous vehicles (AV), and cloud computing play in the context of smart societies; secondly, they analyse how the synergy between these technologies will be used by governments and other stakeholders around the world to improve the safety of citizens albeit increasingly relinquishing privacy rights and encouraging mass surveillance at the expense of liberty.


Author(s):  
Kenneth J. Sousa ◽  
Laurie E. MacDonald ◽  
Kenneth T. Fougere

This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students.


Sign in / Sign up

Export Citation Format

Share Document