Silverstein, 2004 - Google Patents
The Double Edged Sword: An Examination of the Global Positioning System, Enhanced 911, and the Internet and Their Relationships to the Lives of Domestic …Silverstein, 2004
View PDF- Document ID
- 14640770183059466762
- Author
- Silverstein L
- Publication year
- Publication venue
- Buff. Women's LJ
External Links
Snippet
Amy Lynn Boyer had no idea that with just a few simple computer keystrokes, it would take only minutes for a man she barely knew to get a lifetime's worth of information about her. Amy did not know that her home address, her social security number, and her credit …
- 238000009114 investigational therapy 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance, e.g. risk analysis or pensions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Joh | The undue influence of surveillance technology companies in policing | |
Choi et al. | Voice phishing fraud and its modus operandi | |
Amster et al. | Against geofences | |
Gray et al. | Fighting cybercrime after united states v. jones | |
Apuzzo et al. | With CIA help, NYPD moves covertly in Muslim areas | |
Gee | Almost Gone: The Vanishing Fourth Amendment's Allowance of Stingray Surveillance in a Post-Carpenter Age | |
Lord | Undercover under threat: Cover identity, clandestine activity, and covert action in the digital age | |
Marshall et al. | Police surveillance of cell phone location data: Supreme Court versus public opinion | |
Benny | Industrial Espionage | |
Silverstein | The Double Edged Sword: An Examination of the Global Positioning System, Enhanced 911, and the Internet and Their Relationships to the Lives of Domestic Violence Victims and Their Abusers | |
Brown et al. | Pondering personal privacy: A pragmatic approach to the fourth amendment protection of privacy in the information age | |
Essert | Addressing imperfect solutions to technology-facilitated domestic violence | |
Dowdell | You Are Here-Mapping the Boundaries of the Fourth Amendment with GPS Technology | |
Nouwt | Reasonable expectations of geo-privacy | |
Chasin | The Revolution Will be Tweeted, but the Tweets Will be Subpoenaed: Reimagining Fourth Amendment Privacy to Protect Associational Anonymity | |
Arun | In pursuit of personal data: A survey on state surveillance and democracy in India | |
Green | Who Holds the Hammer? A Private Ordering Framework as the Key to Carpenter’s Privacy Puzzle | |
Pratt et al. | Without permission: Privacy on the line | |
Simmons | A Failed Revolution: The Muted Impact of Jones, Riley, and Carpenter | |
Raymond | THE RIGHT TO INFORMATION DATA PRIVACY ON THE INTERNET. | |
Owsley | The Best Offense is a Good Defense: Fourth Amendment Implications of Geofence Warrants | |
Kessinger | Breaking The Chains: Addressing Criminal Records for Sex Trafficking Survivors Through Vacatur Laws | |
Browne | Ill-Suited to the Digital Age: Problems with Emerging Judicial Perspectives on Warrantless Searches of Cell Site Location Information | |
Stover | Privacy vs. Protection: Why Tracking Mobile-Device Location Data Without a Warrant Requires a Fourth Amendment Exception | |
Bushnell Jr | Big Brother and His Magic 8-Ball: A Legal Analysis of the Applications of Data Assisted Predictive Policing |