Author(s): Jennifer Urban Year: 2012 Abstract: Computing is ubiquitous in every domain of scientific research. Software is the means by which scientists harness the power of computers, and much scientific computing relies on software conceived and developed by other practicing researchers. The task of creating scientific software, however, does not end with the publication of […]
A Quick Guide to Software Licensing for the Scientist-Programmer
Does Familiarity Breed Contempt Among Judges Deciding Patent Cases?
Author(s): Jennifer Urban Year: 2013 Abstract: We offer the first comprehensive look at how a district judge’s experience affects decisionmaking in patent cases. We find that that there is a strong, statistically significant relationship between a judge’s experience and case outcome: more experienced judges are less likely to rule for the patentee. Notably, the relationship […]
Exploring Information Sharing through California’s ‘Shine the Light’ Law
Author(s): Chris Jay Hoofnagle Year: 2009 Abstract: Consumers have a dim understanding of how companies share personal information. To “shine a light” on information sharing practices, the authors employed a unique California law to survey the information sharing practices of 112 businesses. This follow-on study to a similar, smaller survey in 2007, found that four […]
Transactional Confidentiality in Sensor Networks
Author(s): Deirdre K. Mulligan Year: 2008 Abstract: In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data – that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the […]
Preemption and Privacy
Author(s): Paul M. Schwartz Year: 2009 Abstract: A broad coalition, including companies formerly opposed to the enactment of privacy statutes, has now formed behind the idea of a national information privacy law. Among the benefits that proponents attribute to such a law is that it would harmonize the U.S. regulatory approach with that of the […]
A Model Regime of Privacy Protection (Version 2.0)
Author(s): Chris Jay Hoofnagle Year: 2005 Abstract: This version incorporates and responds to the many comments that we received to Version 1.1, which we released on March 10, 2005. Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative […]
A Model Regime of Privacy Protection (Version 1.1)
Author(s): Chris Jay Hoofnagle Year: 2005 Abstract: Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of […]
Putting Identity Theft on Ice: Freezing Credit Reports to Prevent Lending to Impostors
Author(s): Chris Jay Hoofnagle Year: 2005 Abstract: Identity theft is a growing problem. In any given identity theft situation, there are three actors – the victim, the impostor, and an institution, such as a bank or credit card company. Thus far, policymakers have attempted to address the crime by focusing on victims and impostors; victims […]
Big Brother’s Little Helpers: How Choicepoint and Other Commercial Data Brokers Collect, Process, and Package Your Data for Law Enforcement
Author(s): Chris Jay Hoofnagle Year: 2008 Abstract: The shift to a digital information environment has brought many changes to law enforcement access to personal data. Now, by visiting a single website, such as www.cpgov.com, law enforcement can obtain a comprehensive dossier on almost any adult. That website was custom-tailored for law enforcement by ChoicePoint, Inc., […]
Privacy Self Regulation: A Decade of Disappointment
Author(s): Chris Jay Hoofnagle Year: 2008 Abstract: The Federal Trade Commission’s Do-Not-Call Registry, a government-created protection for privacy, is a stellar success. With over 80 million numbers enrolled, Americans now have a easy to use and effective shield against telemarketing. The government’s creation quickly superceded and made irrelevant self-regulatory solutions, which were difficult to use, […]