To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
One of the most contentious issues relting to sex and gender identity is whether a transgener person has a right to keep informaiton about their biological sex private from others. Related to the right to freedom of expression, discussed in previous chapters, is the countervailing right to private life. Nowhere encapsulates the potential for human rights to conflict more clearly than the tension between the interest of one person to disclose information that another party would rather be kept private. This chapter examines circumstances when it may be lawful to disclose information about the biological sex of another when they would strongly wish that information not be shared at all. Relatedly, it explores circumstances when heightened rights of privacy may obtain as a result of data protection obligations placed on businesses and public bodies. There is no absolute right to keep the fact of one’s sex private, but there may be some circumstances where one has a reasonable expectation of privacy and where disclosure may be unlawful.
Defamation is a ubiquitous tort in modern society. Defamation protects a person’s reputation, rather than their bodily integrity, goods or land. With the rapid expansion of social media, it is frighteningly easy for false and disparaging comments to spread online like wildfire. This chapter introduces the tort of defamation and its purpose in society. Defamation has undergone substantial reform over the years, thus key amendments are explained, along with emerging issues. The chapter outlines and explains the elements of defamation and explores cases that clarify how courts interpret and apply defamation principles. Next, defences and remedies are explained, followed by the increasing focus on defamation and social media. The chapter concludes with a brief discussion of privacy and breach of confidentiality, on which plaintiffs can rely when defamation does not assist.
Human genetic data are simultaneously deeply personal, familial, and strategically valuable, raising regulatory challenges that individual-centered privacy frameworks only partially address. This is highlighted by the recent high-profile bankruptcy filing by 23andMe, which triggered widespread public concerns extending beyond consumer privacy interests to potential national security risks. To address this, this paper proposes a three-layer diagnostic model for more comprehensive analysis of genetic data governance: (1) individual privacy as sensitive personal data; (2) relational and group (privacy) interests reflecting genetic data’s shared nature; and (3) the state or strategic layer treating genetic information as a national asset relevant to public health and security. Drawing on comparative examination of select jurisdictions and critical review of scholarship, this integrated framework offers researchers, policymakers, and private actors a practicable pathway to navigate the complex governance challenges posed by genetic data.
Erasure codes find various applications: Each of those puts different constraints on the erasure code, for example, on the blocklength, code rate, decoding complexity, or number of decoding operations. This chapter discusses some of them.
There are all sorts of dilemmas when it comes to technology and education. How much should be allowed in schools? Do teachers have to worry about students’ data security and privacy? Is it ok for you to ask a computer to write your essay for you? Are we ruining the eyesight and attention spans of an entire generation thanks to excessive screen time? This chapter looks at the debates that exist when it comes to digital technology and education. It will be argued here that the interplay between technology and education is highly complex – and changing – at a pace that is almost unimaginable.
This contribution to understanding friendship as a distinct social relationship examines the distinction between friendship dyads and groups of friends by focusing on the communicative dynamics of intimacy and discretion. Drawing on the work of Simmel and Luhmann, I argue that dyadic friendship supports intimate communication characterized by immediacy, mutual disclosure, and the suspension of self-consciousness. The addition of a third party, however, shifts interaction into public mode, requiring increased discretion and greater communicative management. I offer a formal account of how the number of participants alters the quality of interaction and suggest that while intimacy is not a constant feature of friendship, it nevertheless remains a constitutive potential. To conclude, I argue that groups of friends can be intimate social formations only insofar as endogenous, “private” dyadic bonds are formed.
Chapter 6 reconstructs the technology-specific legal contours of freedom of expression in the Internet age, presenting empirical evidence of the growing importance of technology for legal practice and regulation. Since data-processing technology is a prerequisite for free speech, the starting point is privacy law. An important distinction is made between data integrity and network integrity and the discussion on net neutrality and the open Internet is revisited. The case law of the ECtHR on Article 10 ECHR is also examined to see if there is a tendency to recognise an independent ‘right to transmit’. Moreover, the activities of the Internet Corporation for Assigned Names and Numbers (ICANN) can be seen to produce technology-related standards relevant to the freedom of expression. ICANN, which is responsible for routing data packets to their destination, controls the ‘master key’ to the entire global Internet and can thus influence the conditions under which freedom of communication is possible. Finally, the chapter addresses the technical standards for the Internet developed by the independent Internet Architecture Board and the Internet Engineering Task Force, which are also crucial for the freedom of expression.
Chapter 6 looks at the failures of educational innovation during the Covid-19 crisis. As schools scrambled to adapt to remote learning, remote proctoring technologies rapidly expanded. They implemented surveillance systems that violated student privacy and disproportionately harmed vulnerable students. Despite claims of maintaining academic integrity, remote proctoring created a stressful, punitive environment that prioritized monitoring over genuine educational support while failing to do nearly enough to address the inequalities at the heart of accessing and using digital resources. Sadly, the rush to innovate missed crucial opportunities to upgrade core educational infrastructure and truly support students during a time of unprecedented challenge. As if this wasn’t bad enough, some schools continue to use remote proctoring software. A pandemic problem has thus become the new normal.
Chapter 5, “The Failed Promise of Covid Innovation,” presents the pandemic as a crucial case study of how innovative thinking let us down at a time of great vulnerability. Simply put, the early days of massive fatalities made COVID-19 a health crisis. But those days also can be seen as a powerful lens for understanding high-tech failure. From contact tracing apps to thermal imaging cameras and digital vaccine passports, there was a fever pitch of government and corporate enthusiasm for innovative solutionism that was predestined to be unreliable and, thus, in context, dangerous. While we acknowledge remarkable breakthroughs like the rapid development of mRNA vaccines, we also make the case that additional effective responses could have come from upgrading existing systems rather than trying to do things entirely new.
Chapter 3 dives deep into the beating heart of cryptocurrency, the paradoxical technology that has made early adherents billions, while adding nothing of real value to society. By any measure, crypto has failed at its stated goal: creating a better financial system. Looking to Bitcoin, we show how the core innovation – a distributed encrypted database – makes a terrible payment system, with slow, expensive, uncorrectable transactions. But crypto enthusiasts ignore more than a decade of failure, doubling down on grandiose claims about solving everything from financial inclusion to corporate governance while ignoring the far easier, low-tech solutions to these very real needs. We include an interview with an early supporter of the massive crypto currency Ethereum, who came to see how crypto became “just a tool for the wealthy to become wealthier” rather than fulfilling its promise of financial inclusion for the world’s 1.7 billion unbanked people.
Chapter 4 critically examines the fact that sometimes innovations not only fail to solve crucial problems, but are the problem itself. Specifically, it explains why Ring doorbell exemplifies the threat of home surveillance innovation. The billion-dollar Amazon subsidiary sold millions of Americans on the promise of security via surveillance without any credible evidence that its system works. But rather than encouraging people to adopt proven security upgrades, such as better locks and secure package drops, Ring wins customers by making its digital innovation seem essential amid a climate of rising fear. By fighting against boring yet effective alternatives, Ring’s anxiety-inducing features have further normalized intensive networked surveillance and helped turn innocuous neighborly interactions into potential threats.
Inter-Asian Law is starkly absent from constitutional accounts of reproductive rights in Asia. Instead, Asian jurisdictions tend to draw from the Global North, with the United States Supreme Court decision in Roe v Wade occupying norm status. To explicate the potential of Inter-Asian Law in transforming reproductive rights, an act of imagination is required, suspending Roe as the central comparative frame and introducing alternate, hypothetical referents from Asia. This chapter conducts this task at two stages. First, it develops imagination as a method of comparative constitutional law. Second, applying the imaginative method, it hypothesizes what reproductive rights might look like if Nepal served as a referent for India and India as a referent for Bangladesh. In documenting explicit shifts in the constitutional construction of these rights, the chapter cements the place of Inter-Asian Law.
Thus far, we have largely considered technologies that are capable of changing persons’ mental states. However, today, a range of technologies are also being developed that can gain insight into the mental realms of others. One example is the measurement of brain activity, which has enabled researchers to make inferences about individual mental states and faculties. In particular, fMRI and EEG can measure brain activity in a way that allows for inferences about what a person remembers, recognises, thinks or feels. EEG has been used, for example, to identify concealed memories about a criminal offence; and fMRI has been used to reveal sexual orientation, political ideology or a person’s craving for cocaine. Recently, various research groups used neurotechnology together with emerging forms of artificial intelligence (AI) to decode mental content from brain activity, with some interesting first results. According to Brownsword, with the development of these kinds of “brain-reading” technologies, “researchers have a window into the brains and, possibly, into a deeper understanding of the mental lives of their participants”.
The introduction and use of digital contact tracing apps as part of pandemic management have notably raised many legal and ethical challenges, ranging from determinations of public interest in using gathered data to privacy protections for app users and broader considerations of national socio-economic priorities. As the use of these digital contact tracing apps is supported by laws, legal preparedness is essential in determining appropriate legal authority that considers necessary trade-offs such as temporary privacy infringements, proportional data gathering and collective public health benefits. This paper examines the extent of legal preparedness in addressing competing interests between public health and individuals in the use of digital contact tracing apps. It does so through two main lenses: (1) an analysis of Singapore’s legal framework pertaining to data protection, privacy and contact tracing apps and (2) an analysis of the domestic social and political influences that explain why Singapore’s approach to digital contact tracing was viable, and assess its potential or limits for broader applicability.
This chapter provides an introduction to the concepts of privacy, such as privacy-by-design and provides specific challenges related to privacy in HCI such as personally identifiable information, personal health data, personal genetic data, and location data. The chapter discusses Federal and state laws, as well as case law related to privacy of information, and how interfaces may enhance privacy or confuse users.
When two people read together, what do they stand to learn not just about the book, but about each other? Representations of people reading together in Romantic literature often describe the act of sharing a book as a kind of litmus test of sympathy. Frequently, however, fictional readers end up misreading the text, or each other, or both. Stacey McDowell shows how Romantic writers, in questioning the assumptions lying behind the metaphorical sense of reading as sympathy, reflect on ideas of reading – its private or social nature and its capacity to foster fellow feeling – while also suggesting something about the literary qualities intrinsic to sympathy itself – its hermeneutic, narrative, and rhetorical strategies. She reveals what the literary portrayal of shared reading adds to histories of the book and moral philosophy, and how the effects of form and style aim to reproduce the shared experience of reading described.
This volume shows how remote work is regulated by a holistic set of arrangements that govern all forms of employment, weaving together labor institutions in complex ways that the book presents and explains. The scholarship assembled here examines the handling of remote work through institutional analysis cutting across national cases and focusing on both fundamental rights and regulatory challenges. The rights that are examined – by analyzing their nteraction with employer powers – include privacy, equality and non-discrimination as well as collective rights and the distribution of responsibilities in the workplace. The book shows how the location of work interacts with new technologies redefining the universe of labor relations and the institutional system governing employment. This title is also available as open access on Cambridge Core.
Preparing and filing taxes has become an increasingly digital task. Older adults need to file taxes to qualify for benefits, but little is known about how older adults in Canada manage tax preparation, nor about how they get help. We investigated delegation mechanisms provided by the Canada Revenue Agency, documenting workflows needed to set up delegation and identifying privacy and security risks. We conducted a semi-structured interview study (n = 19) with older adults, formal tax volunteers, and informal tax helpers to understand the challenges and experiences in tax delegation. Our results show that the CRA’s delegation mechanisms are lightweight and enable older adults to delegate tasks to others with minimal privacy and security risks. However, we found these lightweight mechanisms were not known about or used by the older adults who delegated to informal tax helpers, nor were they known about or used by any of the informal tax helpers we interviewed.
This chapter continues to study social media platforms but with a focus on the relationship between citizens and companies, particularly the co-production of data that serves as an important company instrument in the state–company partnership. It reveals inequalities in data production among citizens, systematically varying in terms of geographical distribution, privacy concerns, motivations, and choice. It differentiates different types of user behavior – discussing (producing political content and metadata) and lurking (producing metadata). Based on the China Internet Survey (CIS) 2018, it finds that Chinese users have similar motivations to users in other contexts, thus contributing to data production as privacy concerns remain less important compared to other motivations. This conceptualization of co-production rests not only on user participation on platforms, but also on the role of platform architecture and technological infrastructure that afford users’ choices. Through examining the role of the Great Chinese Firewall, the chapter finds that only about 12 percent of internet users jump the firewall to seek political information. A comparison of the three most popular platforms regarding their technological design show that Weibo and Baidu Tieba facilitate the production of political content more effectively compared to WeChat.
In Chilling Effects, Jonathon W. Penney explores the increasing weaponization of surveillance, censorship, and new technology to repress and control us. With corporations, governments, and extremist actors using big data, cyber-mobs, AI, and other threats to limit our rights and freedoms, concerns about chilling effects – or how these activities deter us from exercising our rights – have become urgent. Penney draws on law, privacy, and social science to present a new conformity theory that highlights the dangers of chilling effects and their potential to erode democracy and enable a more illiberal future. He critiques conventional theories and provides a framework for predicting, explaining, and evaluating chilling effects in a range of contexts. Urgent and timely, Chilling Effects sheds light on the repressive and conforming effects of technology, state, and corporate power, and offers a roadmap of how to respond to their weaponization today and in the future.