K. A. Taipale, Technology, Security and Privacy: The Fear of Frankenstein, the Myth of Privacy and the Lessons of King Ludd, 7 Yale J. L. & Tech. (forthcoming Dec. 2004, 88 pages, PDF):
“This paper examines technologies of identification, data aggregation and analysis (including data mining), and collection currently being considered for use in the context of domestic security and argues that value sensitive development strategies that take privacy concerns into account during design and development can build in technical features – including rule-based processing, selective revelation, and strong credential and audit – that can enable existing legal control mechanisms and related procedures for the protection of civil liberties and due process to function.”
Sorry, comments are closed for this post.