Privacy and the New Virtualism

نویسنده

  • JONATHON W. PENNEY
چکیده

First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this Article offers a new approach to privacy in cyberspace by drawing on what Orin Kerr calls the internalist or virtualist perspective. The virtualist approach to privacy in cyberspace shifts the focus away from the concept of privacy itself which has been over-theorized and overcategorized by privacy theorists, to analyzing and theorizing persons in cyberspace and how they ought to be understood. It focuses on virtual persons and the distinct privacy concerns they raise, and reconnects ideas about informational and data privacy to traditional normative justifications for privacy based on personhood. Adopting a virtualist approach to privacy in cyberspace has conceptual, normative, constitutional, and public policy benefits. Recently a postgraduate researcher at the Faculty of Law, Oxford University, where he was a Mackenzie King Travelling Scholar. The author would like to thank the staff of the Oxford Internet Institute for their patience and assistance in the course of this research and YJoLT editor Caitlin Hall for her help in preparing the article for publication. He would also like to thank Robert Danay, Jonathan Zittrain, Richard Albert, Ali Abrar,, Julie Cohen, and Kandia Aird for their advice, comments and/or suggestions. 1 PENNEY: PRIVACY AND THE NEW VIRTUALISM Published by Yale Law School Legal Scholarship Repository, 2008 PRIVACY AND THE NEW VIRTUALISM

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

مطالعه‌ای مروری بر حفظ حریم بیماران

The concept of privacy, which is used in many disciplines, is a basic human need and also is recognized as an important concept in nursing. The concept of privacy has been described in various dimensions including physical, psychological, social and informational privacy. In this article we review these dimensions. Most of the studies related to the privacy have been carried out in the area of...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013