[go: up one dir, main page]

Silverstein, 2004 - Google Patents

The Double Edged Sword: An Examination of the Global Positioning System, Enhanced 911, and the Internet and Their Relationships to the Lives of Domestic …

Silverstein, 2004

View PDF
Document ID
14640770183059466762
Author
Silverstein L
Publication year
Publication venue
Buff. Women's LJ

External Links

Snippet

Amy Lynn Boyer had no idea that with just a few simple computer keystrokes, it would take only minutes for a man she barely knew to get a lifetime's worth of information about her. Amy did not know that her home address, her social security number, and her credit …
Continue reading at digitalcommons.law.buffalo.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance, e.g. risk analysis or pensions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking

Similar Documents

Publication Publication Date Title
Joh The undue influence of surveillance technology companies in policing
Choi et al. Voice phishing fraud and its modus operandi
Amster et al. Against geofences
Gray et al. Fighting cybercrime after united states v. jones
Apuzzo et al. With CIA help, NYPD moves covertly in Muslim areas
Gee Almost Gone: The Vanishing Fourth Amendment's Allowance of Stingray Surveillance in a Post-Carpenter Age
Lord Undercover under threat: Cover identity, clandestine activity, and covert action in the digital age
Marshall et al. Police surveillance of cell phone location data: Supreme Court versus public opinion
Benny Industrial Espionage
Silverstein The Double Edged Sword: An Examination of the Global Positioning System, Enhanced 911, and the Internet and Their Relationships to the Lives of Domestic Violence Victims and Their Abusers
Brown et al. Pondering personal privacy: A pragmatic approach to the fourth amendment protection of privacy in the information age
Essert Addressing imperfect solutions to technology-facilitated domestic violence
Dowdell You Are Here-Mapping the Boundaries of the Fourth Amendment with GPS Technology
Nouwt Reasonable expectations of geo-privacy
Chasin The Revolution Will be Tweeted, but the Tweets Will be Subpoenaed: Reimagining Fourth Amendment Privacy to Protect Associational Anonymity
Arun In pursuit of personal data: A survey on state surveillance and democracy in India
Green Who Holds the Hammer? A Private Ordering Framework as the Key to Carpenter’s Privacy Puzzle
Pratt et al. Without permission: Privacy on the line
Simmons A Failed Revolution: The Muted Impact of Jones, Riley, and Carpenter
Raymond THE RIGHT TO INFORMATION DATA PRIVACY ON THE INTERNET.
Owsley The Best Offense is a Good Defense: Fourth Amendment Implications of Geofence Warrants
Kessinger Breaking The Chains: Addressing Criminal Records for Sex Trafficking Survivors Through Vacatur Laws
Browne Ill-Suited to the Digital Age: Problems with Emerging Judicial Perspectives on Warrantless Searches of Cell Site Location Information
Stover Privacy vs. Protection: Why Tracking Mobile-Device Location Data Without a Warrant Requires a Fourth Amendment Exception
Bushnell Jr Big Brother and His Magic 8-Ball: A Legal Analysis of the Applications of Data Assisted Predictive Policing