Abbreviated version of a speech delivered by the Member of the European Partiament Sophie in ‘t Veld in Amsterdam in May 2017 to Data & Democracy, a conference on political micro-targeting.
Research articles on Privacy & Security
Cyberspace governance struggles with three accountability challenges, the problem of many hands, the profusion of issue areas, as well as the hybridity and malleability of institutional arrangements. In order to address and mitigate these challenges, accountability relationships need to be consciously reframed and discursively constructed.
The campaign against Israel’s biometric database demonstrates how civil society can advocate for privacy even when “privacy is dead”.
This paper is part of ' Australian internet policy ’, a Special issue of Internet Policy Review. Acknowledgement: Thanks to the Melbourne Networked Society Institute at the University of Melbourne for funding our research project ‘The Internet of Things (IoT) and Consumer Privacy’, 2015-2016, and to our participants for generously sharing their
This paper is part of ' Australian internet policy ’, a Special issue of Internet Policy Review. Introduction In 2007, the Australian government took a dramatic new approach to the governance and management of remote Indigenous communities. The ‘Northern Territory Intervention’, as it became commonly known, was introduced as a means to combat
The ‘lawful’ intrusion or interference with information communication infrastructures poses challenges to democratic freedoms in Australia.
This paper is part of ' Australian internet policy ’, a Special issue of Internet Policy Review. Part I: The Data Retention Act In April 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act , which requires Internet Service Providers (ISPs) and telecommunications providers to store
Internet users need a cyber security mindset, argues William H. Dutton. This paper seeks to explain the concept of a security ‘mindset’ and its social significance.
This paper provides qualitative analysis of Google’s and Microsoft’s policies and examines case studies to enhance understanding about the privacy role of information intermediaries in self-regulatory arrangements.
Focusing on different democratic ways of negotiating online privacy the authors identify several governance modes, including the currently prevailing protectionist mode.