Matches in SemOpenAlex for { <https://semopenalex.org/work/W3124663189> ?p ?o ?g. }
Showing items 1 to 85 of
85
with 100 items per page.
- W3124663189 startingPage "1227" @default.
- W3124663189 abstract "This Article contrasts two models for understanding and protecting against privacy violations. Traditionally, privacy violations have been understood as invasive actions by particular wrongdoers who cause direct injury to victims. Victims experience embarrassment, mental distress, or harm to their reputations. Privacy is not infringed until these mental injuries materialize. Thus, the law responds when a person's deepest secrets are exposed, reputation is tarnished, or home is invaded. Under the traditional view, privacy is an individual right, remedied at the initiative of the individual. In this Article, Professor Solove contends the traditional model does not adequately account for many of the privacy problems arising today. These privacy problems do not consist merely of a series of isolated and discrete invasions or harms, but are systemic in nature. They cannot adequately be remedied by individual rights and remedies alone. In contrast, Professor Solove proposes a different model for understanding and protecting against these privacy problems. Developing the notion of as used by Joel Reidenberg and Lawrence Lessig, Solove contends that many privacy problems must be understood as the product of a broader structural system which shapes the collection, dissemination, and use of personal information. Lessig and Reidenberg focus on of structures that function to exercise greater dominion over individuals. Solove argues that in addition to architectures of control, we are seeing the development of of which create a world where people are vulnerable to significant harm and are helpless to do anything about it. Solove argues that protecting privacy must focus not merely on remedies and penalties but on shaping architectures. Professor Solove illustrates these points with the example of identity theft, one of the most rapidly growing types of criminal activity. Identity theft is often conceptualized under the traditional model as the product of disparate thieves and crafty criminals. The problem, however, has not been adequately conceptualized, and, as a result, enforcement efforts have been misdirected. The problem, as Solove contends, is one created by an architecture, one that creates a series of vulnerabilities. This architecture is not created by identity thieves; rather, it is exploited by them. It is an architecture of vulnerability, one where personal information is not protected with adequate security. The identity thief's ability to so easily access and use our personal data stems from an architecture that does not provide adequate security to our personal information and that does not afford us with a sufficient degree of participation in the collection, dissemination, and use of that information. Understanding identity theft in terms of architecture reveals that it is part of a larger problem that the law has thus far ignored. Solove then discusses solutions to the identity theft problem. He engages in an extensive critique of Lynn LoPucki's solution, which involves the creation of a public identification system. After pointing out the difficulties in LoPucki's proposal, Solove develops an architecture that can more appropriately curtail identity theft, an architecture based on the Fair Information Practices." @default.
- W3124663189 created "2021-02-01" @default.
- W3124663189 creator A5054915942 @default.
- W3124663189 date "2003-01-01" @default.
- W3124663189 modified "2023-09-26" @default.
- W3124663189 title "Identity Theft, Privacy, and the Architecture of Vulnerability" @default.
- W3124663189 hasPublicationYear "2003" @default.
- W3124663189 type Work @default.
- W3124663189 sameAs 3124663189 @default.
- W3124663189 citedByCount "18" @default.
- W3124663189 countsByYear W31246631892012 @default.
- W3124663189 countsByYear W31246631892013 @default.
- W3124663189 countsByYear W31246631892014 @default.
- W3124663189 countsByYear W31246631892015 @default.
- W3124663189 countsByYear W31246631892018 @default.
- W3124663189 crossrefType "journal-article" @default.
- W3124663189 hasAuthorship W3124663189A5054915942 @default.
- W3124663189 hasConcept C108827166 @default.
- W3124663189 hasConcept C121332964 @default.
- W3124663189 hasConcept C123201435 @default.
- W3124663189 hasConcept C144024400 @default.
- W3124663189 hasConcept C15744967 @default.
- W3124663189 hasConcept C169093310 @default.
- W3124663189 hasConcept C175968658 @default.
- W3124663189 hasConcept C17744445 @default.
- W3124663189 hasConcept C193934123 @default.
- W3124663189 hasConcept C199539241 @default.
- W3124663189 hasConcept C24890656 @default.
- W3124663189 hasConcept C2776716606 @default.
- W3124663189 hasConcept C2777363581 @default.
- W3124663189 hasConcept C2777930997 @default.
- W3124663189 hasConcept C2778355321 @default.
- W3124663189 hasConcept C38652104 @default.
- W3124663189 hasConcept C41008148 @default.
- W3124663189 hasConcept C48798503 @default.
- W3124663189 hasConcept C77805123 @default.
- W3124663189 hasConceptScore W3124663189C108827166 @default.
- W3124663189 hasConceptScore W3124663189C121332964 @default.
- W3124663189 hasConceptScore W3124663189C123201435 @default.
- W3124663189 hasConceptScore W3124663189C144024400 @default.
- W3124663189 hasConceptScore W3124663189C15744967 @default.
- W3124663189 hasConceptScore W3124663189C169093310 @default.
- W3124663189 hasConceptScore W3124663189C175968658 @default.
- W3124663189 hasConceptScore W3124663189C17744445 @default.
- W3124663189 hasConceptScore W3124663189C193934123 @default.
- W3124663189 hasConceptScore W3124663189C199539241 @default.
- W3124663189 hasConceptScore W3124663189C24890656 @default.
- W3124663189 hasConceptScore W3124663189C2776716606 @default.
- W3124663189 hasConceptScore W3124663189C2777363581 @default.
- W3124663189 hasConceptScore W3124663189C2777930997 @default.
- W3124663189 hasConceptScore W3124663189C2778355321 @default.
- W3124663189 hasConceptScore W3124663189C38652104 @default.
- W3124663189 hasConceptScore W3124663189C41008148 @default.
- W3124663189 hasConceptScore W3124663189C48798503 @default.
- W3124663189 hasConceptScore W3124663189C77805123 @default.
- W3124663189 hasIssue "4" @default.
- W3124663189 hasLocation W31246631891 @default.
- W3124663189 hasOpenAccess W3124663189 @default.
- W3124663189 hasPrimaryLocation W31246631891 @default.
- W3124663189 hasRelatedWork W1523091741 @default.
- W3124663189 hasRelatedWork W1527537006 @default.
- W3124663189 hasRelatedWork W1564426901 @default.
- W3124663189 hasRelatedWork W1581977652 @default.
- W3124663189 hasRelatedWork W1993258937 @default.
- W3124663189 hasRelatedWork W2171281821 @default.
- W3124663189 hasRelatedWork W2262967144 @default.
- W3124663189 hasRelatedWork W237718795 @default.
- W3124663189 hasRelatedWork W2616332126 @default.
- W3124663189 hasRelatedWork W3006221238 @default.
- W3124663189 hasRelatedWork W3121813439 @default.
- W3124663189 hasRelatedWork W3122189155 @default.
- W3124663189 hasRelatedWork W3122393744 @default.
- W3124663189 hasRelatedWork W3123156723 @default.
- W3124663189 hasRelatedWork W3125152838 @default.
- W3124663189 hasRelatedWork W3184218770 @default.
- W3124663189 hasRelatedWork W645362015 @default.
- W3124663189 hasRelatedWork W65688647 @default.
- W3124663189 hasRelatedWork W72496981 @default.
- W3124663189 hasRelatedWork W2757014548 @default.
- W3124663189 hasVolume "54" @default.
- W3124663189 isParatext "false" @default.
- W3124663189 isRetracted "false" @default.
- W3124663189 magId "3124663189" @default.
- W3124663189 workType "article" @default.