Triangulating Intrusion in Privacy Law

被引:8
|
作者
Bennett, Thomas D. C. [1 ]
机构
[1] City Law Sch, London, England
关键词
privacy; semantics; common law development; tort;
D O I
10.1093/ojls/gqz024
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This article concerns two interrelated, persistent problems for privacy law. The first is the failure of academic scholarship to get adequately to grips with the meaning of privacy. The second is the apparent inability of the English judiciary to resolve the common law lacuna in respect of intrusion-type privacy violations. The two problems are related in that the former is a significant contributor to the latter. Mainstream scholarship has long insisted on pursuing the One True Meaning of privacy, thereby overlooking valid alternative conceptualisations and creating a melange of theories that provides little assistance to judges. However, by adopting a novel, triangulation-based approach to understanding privacy of the sort proposed herein, it is possible to locate points of consensus between these rival theories in respect of particular privacy-violating activities. This consensus can provide the certainty common law judges require for the elaboration of further doctrine in this field.
引用
收藏
页码:751 / 778
页数:28
相关论文
共 50 条
  • [1] An Intrusion Theory of Privacy
    Panichas G.E.
    Res Publica, 2014, 20 (2) : 145 - 161
  • [2] PIDS: a privacy intrusion detection system
    Venter, HS
    Olivier, MS
    Eloff, JHP
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 2004, 14 (05): : 360 - 365
  • [3] Ethics, Law and Privacy Disentangling Law from Ethics in Privacy Discourse
    Fuster, Gloria Gonzalez
    Gutwirth, Serge
    2014 IEEE INTERNATIONAL SYMPOSIUM ON ETHICS IN SCIENCE, TECHNOLOGY AND ENGINEERING, 2014,
  • [4] Intrusion Detections in Collaborative Organizations by Preserving Privacy
    Verma, Nischal
    Trousset, Francois
    Poncelet, Pascal
    Masseglia, Florent
    ADVANCES IN KNOWLEDGE DISCOVERY AND MANAGEMENT, 2010, 292 : 235 - +
  • [5] PPIDS: Privacy preserving intrusion detection system
    Park, Hyun-A
    Lee, Dong Hoon
    Lim, Jongin
    Cho, Sang Hyun
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 269 - +
  • [6] Reassembling Privacy: Vernacular Privacy in Law and The Scarlet Letter
    Gilmore, Leigh
    LAW & LITERATURE, 2015, 27 (03) : 295 - 312
  • [7] A Behavioural Understanding of Privacy and its Implications for Privacy Law
    Hughes, Kirsty
    MODERN LAW REVIEW, 2012, 75 (05) : 806 - 836
  • [8] Privacy preserving Intrusion Detection via Homomorphic Encryption
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    Sgaglione, Luigi
    Cotroneo, Domenico
    Scognamiglio, Andrea
    2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2019, : 321 - 326
  • [9] Security, Privacy, and the Role of Law
    Cate, Fred H.
    IEEE SECURITY & PRIVACY, 2009, 7 (05) : 60 - 63
  • [10] Governing Through Privacy: Authoritarian Liberalism, Law, and Privacy Knowledge
    Lippert, Randy K.
    Walby, Kevin
    LAW CULTURE AND THE HUMANITIES, 2016, 12 (02) : 329 - 352