Privacy

Technology’s Threat to Democracy

Katia Vales discusses how advances in technology have not only brought countless benefits to humanity but have also infringed on people’s privacy. The author suggests that continuing to use technology to protect the very liberties that the same technology jeopardizes stands as a significant contradiction to the institutions of this country. While it may feel “justified” to use these invasive technologies because of criminal actions, it is vital to consider the bigger picture and think about what it means for citizens to exist in a state of continuous monitoring.

Read More

Biometric Security

Halle Steffensmeier discusses how biometrics have become increasingly prevalent, citing examples such as retina scans in the Metaverse, fingerprints to access mobile devices, and law enforcement leveraging facial recognition solutions. Biometrics and cyber security are increasingly critical topics of discussion, particularly concerning individual privacy. By providing a complete picture of biometrics and a report on recent events in biometric security, the author hopes to illustrate the troubling reality of biometric data collection: our intimate data in the hands of the world's largest technology companies.

Read More

Ring, Ring. Who’s There? A Burglar

Allison Gibbons discusses the security vulnerabilities around Amazon’s Ring doorbell and how that has led to user information being leaked and accessed without proper authorization. One vulnerability that is touched on is Ring’s relationship with police departments and the privacy concerns that came from police having too much access to Ring doorbell footage. There are ways for users to secure their Ring doorbell and protect their information against these vulnerabilities, and it’s recommended that users take these steps to ensure their personal networks aren’t hacked.

Read More

An Ethical Approach to Big Data Surveillance

Shouyang Wang discusses the trade-off that has occurred between personal privacy and national security in the context of government surveillance programs in a post-9/11 United States. This paper argues that there is an ethical framework that the U.S. government can follow when conducting mass surveillance. The framework is based on various philosophical theories, constitutional rights, and judicial rulings to ensure an ethical and optimized balance between individual privacy and government monitoring.

Read More

Privacy Concerns and Weaponization of TikTok

Alex Gherman discusses how TikTok has established itself as a powerhouse in entertainment and social media since its launch in 2016, touting 1.2 billion active monthly users and bringing in annual revenue of $4.6 billion as of the end of 2021. This popularity has not flourished without its share of criticism and scrutiny, especially considering the app’s origins and ownership within China. These concerns are largely aimed at issues of privacy and the use of the platform as an information weapon.

Read More

Safeguarding Children’s Privacy

Kate Peterson discusses the risks associated with the practice of “sharenting” where parents post photos and share detailed information on social media about their child’s life. As a result, many children now have a digital footprint long before they can use the internet or create social media accounts themselves. Being able to crowdsource challenges and share information with other parents can function as an important part of a caregiver’s support system. However, the practice also increases a child’s risk of identity theft, stalking, cyberbullying, and may violate a child’s privacy, resulting in serious—if unintended—consequences.

Read More

Zoombombing

Serah Prakkat discusses the privacy issues and risk exposures related to Zoombombing, the invasion of video meetings by malicious parties intent on disrupting teleconference sessions. Topics include the risk conditions that led to the issue, changes made by organizations, government regulations, and recommendations aimed at mitigating the risks and preventing the practice.

Read More

Privacy, Innovative Technology, and the Fourth Amendment

Arthur Man explores the intersection of the U.S. Constitution’s Fourth Amendment, innovations in the technology realm, and privacy rights. The author argues that the evolution of technology has allowed governments and corporations alike to infringe on the privacy rights of everyday people. Ultimately, this paper discusses the risk that this violation will continue, dependent upon the public’s willingness to trade privacy rights for comfort and ease of use.

Read More

Facebook and Google Data, Privacy and Transparency

Catherine Bahn discusses how Facebook and Google began to prepare for compliance with the European Union’s General Data Protection Regulation, which began to be enforced in May 2018. The purpose of this new legislation is to “harmonize data privacy laws across Europe”, however, the implications are likely to reach beyond the geopolitical borders of Europe and change the direction of corporate transparency. Facebook and Google have the opportunity to be leaders in building dynamic corporate transparency and considering new economic models with the vast amount of customer data they have and will continue to gather.

Read More

Privacy in the Age of Big Data

Zhuo Shan discusses discusses the various elements surrounding the topic of privacy, particularly in relation to the ever-expanding field of “big data. The content includes a high-level examination of various techniques used to collect users’ data and the associated risks for enterprises and individuals, as well as at the applicable government regulations and laws. The discussion concludes with a presentation of possible risk mitigation recommendations.

Read More

Cell Site Location Information And Fourth Amendment Protection

Brian Stanley delves into an in-depth look at implications of government access to and use of cell site location information (CSLI), and the implication for citizens' fourth amendment protection. In 2017, the U.S. Supreme Court will review of Carpenter vs. United States, which argues that CSLI should be protected under the Fourth Amendment.

Read More

Hypervigilance and the Digital Age

Matthew Welden discusses the development of a hypervigilant culture within the U.S., with attention-grabbing low-frequency incidents overshadowing the far deadlier but less sensational everyday risks. While we now live in a modern world where people are living longer, freer, and richer than ever before, more of us have become captives of fear. The author defines the condition of hypervigilance, illustrates the condition with historical examples, and then offers some solutions to the condition and ethical arguments for their consideration.

Read More

Ashley Madison and Managing a Risky Business

Kevin Rawls discusses some of the heightened levels of internal and external risks faced by a business that operates in a legally sound but morally compromised space.The website AshleyMadison.com is a now notorious website built around enabling married people to have extramarital affairs, that in 2015 experienced a very severe data breach of its customers’ data.

Read More