Privacy Case Study


A common skill for a cybersecurity analyst is the evaluation of current scholarly articles. Analyzing the findings within those articles develops skills that will help protect data. Evaluating privacy laws and regulations helps the analyst form baselines for policies within organizations. Choose one of the following articles to

After reading your selected article, address the following critical elements:

I. Analyze the issues within the article related to privacy.

II. Describe the regulations or laws within the article that play a role in the protection of privacy.

III. Explain your opinions on the conclusion of the article. Consider these questions:

– Is the conclusion comprehensive?

– Do you agree with the conclusion?

– Are there areas that could be improved upon?

Privacy, Notice, and Design

particular, the design of built online environments can constrain our ability to understand and respond to websites’ data use practices or it can enhance agency by giving us control over information. This Article is the first comprehensive theoretical and empirical
approach to the design of privacy policies.
Privacy policies today do not convey information in a way understandable to most
internet users. This is because they are created without the needs of real people in mind.
They are written by lawyers and for lawyers, and they ignore the way most of us make
disclosure decisions online. They also ignore the effects of design, aesthetics, and
presentation on our decision-making. This Article argues that in addition to focusing on
content, privacy regulators must also consider the ways that privacy policy design-the
artistic and structural choices that frame and present a company’s privacy terms to the
public can manipulate or coerce users into making risky privacy choices.

 The Surveillance Gap: The Harms of Extreme Privacy and Data Marginalization

We live in an age of unprecedented surveillance, enhanced by modem
technology, prompting some to suggest that privacy is dead. Previous scholarship
suggests that no subset of the population feels this phenomenon more than
marginalized communities. Those who rely on public benefits, for example, must
turn over personal information and submit to government surveillance far more
routinely than wealthier citizens who enjoy greater opportunity to protect their
privacy and the ready funds to secure it. This article illuminates the other end of
the spectrum, arguing that many individuals who may value government and
nonprofit services and legal protections fail to enjoy these benefits because they
reside in a “surveillance gap.” These people include undocumented immigrants,
day laborers, homeless persons, and people with felony conviction
histories suffering collateral consequences of their convictions. Members of these
groups often remain outside of the mainstream data flows and institutional
attachments necessary to flourish in American society. The harms that
surveillance gap residents experience can be severe, such as physical and mental
health injuries and lack of economic stability, as well as data marginalization and
resulting invisibility to policymakers. In short, having too much privacy can be as
injurious as having too little.
The sources of the surveillance gap range from attempts to contain and control
marginalized groups to data silos to economic exploitation. This article explores
the boundaries of the surveillance gap, evaluates how this emerging concept fits
within existing privacy paradigms and theoretical frameworks, and suggests
possible solutions to enhance the autonomy and dignity of marginalized people
within the surveillance gap.

 Privacy and Cybersecurity Lessons at the Intersection of the Internet of Things and Police Body-Worn Cameras

Prepared for the North Carolina Law Review symposium on
police body-worn cameras (“BWCs”), this Article shows that
BWCs can be conceptualized as an example of the Internet of
Things (“Io T”). By combining the previously separate literatures
on BWCs and loT, this Article shows how insights from each
literature apply to the other.

Part I adopts the loT definition of (1) a sensor connected to the
Internet that (2) stores and/or processes data remotely, typically
in the cloud. Applied to BWCs, the camera is a sensor, and the
video footage and related data are stored outside of the original
camera, often in the cloud.

Building on this equivalence of BWCs and loT, Part II examines
lessons from the substantial IoT literature for BWC privacy and
cybersecurity. Part I systematically examines leading industry
standards and Federal Trade Commission guidance that could be
used to develop applicable criteria for good practice for BWCs.
Analysis of this literature suggests three themes for
operationalizing these best practices. First, police departments
can and should learn from the Io T literature to improve privacy
and cybersecurity for BWCs. Second, police departments should
use their bargaining power to demand security and privacy best

Image preview for”analyzing the findings within those articles develops skills that will help protect data. “

Analyzing the findings within those articles develops skills that will help protect data.


651 words

Click the purchase button to get full answer.

Analyzing the findings within those articles develops skills that will help protect data. was last modified: by