Triangulating Intrusion in Privacy Law

被引:8
|
作者
Bennett, Thomas D. C. [1 ]
机构
[1] City Law Sch, London, England
关键词
privacy; semantics; common law development; tort;
D O I
10.1093/ojls/gqz024
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This article concerns two interrelated, persistent problems for privacy law. The first is the failure of academic scholarship to get adequately to grips with the meaning of privacy. The second is the apparent inability of the English judiciary to resolve the common law lacuna in respect of intrusion-type privacy violations. The two problems are related in that the former is a significant contributor to the latter. Mainstream scholarship has long insisted on pursuing the One True Meaning of privacy, thereby overlooking valid alternative conceptualisations and creating a melange of theories that provides little assistance to judges. However, by adopting a novel, triangulation-based approach to understanding privacy of the sort proposed herein, it is possible to locate points of consensus between these rival theories in respect of particular privacy-violating activities. This consensus can provide the certainty common law judges require for the elaboration of further doctrine in this field.
引用
收藏
页码:751 / 778
页数:28
相关论文
共 50 条
  • [41] Federated Mimic Learning for Privacy Preserving Intrusion Detection
    Al-Marri, Noor Ali Al-Athba
    Ciftler, Bekir S.
    Abdallah, Mohamed M.
    2020 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2020,
  • [42] STATE RIGHT TO PRIVACY KEY TO AVOIDING GOVERNMENT INTRUSION
    ROBERTI, DA
    DATA MANAGEMENT, 1977, 15 (04): : 21 - 22
  • [43] Network Intrusion Detection System to Preserve User Privacy
    Rodda, Sireesha
    Erothi, Uma Shankar Rao
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING, 2018, 9 : 85 - 94
  • [44] Privacy preserving Intrusion Detection via Homomorphic Encryption
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    Sgaglione, Luigi
    Cotroneo, Domenico
    Scognamiglio, Andrea
    2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2019, : 321 - 326
  • [45] Privacy Preservation Intrusion Detection Technique for SCADA Systems
    Keshk, Marwa
    Moustafa, Nour
    Sitnikova, Elena
    Creech, Gideon
    2017 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2017,
  • [46] Privacy intrusion detection using dynamic Bayesian networks
    An, Xiangdong
    Jutla, Dawn
    Cercone, Nick
    2006 ICEC: EIGHTH INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE, PROCEEDINGS: THE NEW E-COMMERCE: INNOVATIONS FOR CONQUERING CURRENT BARRIERS, OBSTACLES AND LIMITATIONS TO CONDUCTING SUCCESSFUL BUSINESS ON THE INTERNET, 2006, : 208 - 215
  • [47] President Clinton, privacy and the law
    Martin, W
    TLS-THE TIMES LITERARY SUPPLEMENT, 1998, (4980): : 17 - 17
  • [48] Refining Privacy in Tort Law
    Hunt, Chris
    CAMBRIDGE LAW JOURNAL, 2014, 73 (01): : 178 - 182
  • [49] Extraterritoriality in Data Privacy Law
    Blume, Peter
    INTERNATIONAL DATA PRIVACY LAW, 2014, 4 (02) : 171 - 173
  • [50] A NEW DEFINITION OF PRIVACY FOR THE LAW
    PARENT, WA
    LAW AND PHILOSOPHY, 1983, 2 (03) : 305 - 338