Information privacy in cyberspace transactions

被引:241
|
作者
Kang, J [1 ]
机构
[1] Univ Calif Los Angeles, Sch Law, Los Angeles, CA 90024 USA
关键词
D O I
10.2307/1229286
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Cyberspace is the rapidly growing network of computing and communication technologies that have profoundly altered our lives. We already carry out myriad social, economic, and political transactions through cyberspace, and, as the technology improves, so will their quality and quantity. But the very technology that enables these transactions also makes detailed, cumulative, invisible observation of our selves possible. The potential for wide-ranging surveillance of all our cyber-activities presents a serious threat to information privacy. To help readers grasp the nature of this threat, Professor Jerry Kang starts with a general primer on cyberspace privacy. He provides a clarifying structure of philosophical and technological terms, descriptions, and concepts that will help analyze any problem at the nexus of privacy and computing-communication technologies. In the second half of the article, he focuses sharply on the specific problem of personal data generated in cyberspace transactions. The private sector seeks to exploit this data commercially, primarily for database marketing, but many individuals resist. The dominant approach to solving this problem is to view personal information as a commodity that interested parties should contract for in the course of negotiating a cyberspace transaction. But this approach has so far failed to address a critical question: which default rules should govern the flow of personal information when parties do not explicitly contract about privacy? On economic efficiency and human dignity wgrounds, Professor Kang argues in favor of a default rule that allows only "functionally necessary" processing of personal information unless the parties expressly agree otherwise. The article concludes with a proposed statute, entitied the Cyberspace Privacy Act, which translates academic theory into legislative practice.
引用
收藏
页码:1193 / 1294
页数:102
相关论文
共 50 条
  • [11] Privacy, emotional closeness, and openness in cyberspace
    Ben-Ze'ev, A
    COMPUTERS IN HUMAN BEHAVIOR, 2003, 19 (04) : 451 - 467
  • [12] Protecting privacy and free speech in cyberspace
    Strossen, N
    GEORGETOWN LAW JOURNAL, 2001, 89 (06) : 2103 - 2115
  • [13] Welcome to IEEE Transactions on Privacy!
    Clifton, Chris
    IEEE Transactions on Privacy, 2024, 1
  • [14] Information retrieval in cyberspace
    Meghabghab, DB
    Meghabghab, GV
    DIGITAL REVOLUTION - ASIS MID-YEAR 1996, 1996, : 224 - 237
  • [15] Cyberspace, information literacy and the information society
    Wallis, Jake
    LIBRARY REVIEW, 2005, 54 (04) : 218 - +
  • [16] ACTA and the Enforcement of Copyright in Cyberspace: the Impact on Privacy
    Ievdokymova, Iryna
    EUROPEAN LAW JOURNAL, 2013, 19 (06) : 759 - 778
  • [17] Obligations for privacy and confidentiality in distributed transactions
    Mbanaso, U. M.
    Cooper, G. S.
    Chadwick, David
    Anderson, Anne
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 69 - +
  • [18] Problems of success: Privacy, property, and transactions
    Wigan, M
    CONVERGING INFRASTRUCTURES: INTELLIGENT TRANSPORTATION AND THE NATIONAL INFORMATION INFRASTRUCTURE, 1996, : 341 - 354
  • [19] Bargaining for Your Privacy in the Information Age: Systematic Factors Undermining the Equity of User-Company Online Information Transactions
    Glazer, Peter
    Straus, Jonathan
    2014 PORTLAND INTERNATIONAL CONFERENCE ON MANAGEMENT OF ENGINEERING & TECHNOLOGY (PICMET), 2014, : 632 - 645
  • [20] Information warfare: battles in cyberspace
    Overill, RE
    COMPUTING & CONTROL ENGINEERING JOURNAL, 2001, 12 (03): : 125 - 128