Triangulating Intrusion in Privacy Law

被引:8
|
作者
Bennett, Thomas D. C. [1 ]
机构
[1] City Law Sch, London, England
关键词
privacy; semantics; common law development; tort;
D O I
10.1093/ojls/gqz024
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This article concerns two interrelated, persistent problems for privacy law. The first is the failure of academic scholarship to get adequately to grips with the meaning of privacy. The second is the apparent inability of the English judiciary to resolve the common law lacuna in respect of intrusion-type privacy violations. The two problems are related in that the former is a significant contributor to the latter. Mainstream scholarship has long insisted on pursuing the One True Meaning of privacy, thereby overlooking valid alternative conceptualisations and creating a melange of theories that provides little assistance to judges. However, by adopting a novel, triangulation-based approach to understanding privacy of the sort proposed herein, it is possible to locate points of consensus between these rival theories in respect of particular privacy-violating activities. This consensus can provide the certainty common law judges require for the elaboration of further doctrine in this field.
引用
收藏
页码:751 / 778
页数:28
相关论文
共 50 条
  • [41] PRIVACY AND THE CANADIAN MEDIA: DEVELOPING THE NEW TORT OF "INTRUSION UPON SECLUSION" WITH CHARTER VALUES
    Mackey, Jared
    WESTERN JOURNAL OF LEGAL STUDIES, 2012, 2 (01):
  • [42] New Hybrid Intrusion Detection and Prevention System to Ensure Security and Privacy in Big Data
    Bakir, Cigdem
    PROCEEDINGS OF 26TH INTERNATIONAL CONFERENCE ELECTRONICS 2022, 2022,
  • [43] Privacy in AI and the IoT: The privacy concerns of smart speaker users and the Personal Information Protection Law in China
    Liu, Yu-li
    Huang, Luyan
    Yan, Wenjia
    Wang, Xinghan
    Zhang, Ruochen
    TELECOMMUNICATIONS POLICY, 2022, 46 (07)
  • [44] Infusing privacy norms in DRM - Incentives and perspectives from law
    Cameron, A
    INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY, 2004, 148 : 297 - 313
  • [45] Love, Story, Law - From the Scarlet Letter to Freedom and Privacy
    Cohen, Nili
    LAW & LITERATURE, 2016, 28 (02) : 209 - 231
  • [46] The Origin of Privacy as a Legal Value: A Reflection on Roman and English Law
    Perinan, Bernardo
    AMERICAN JOURNAL OF LEGAL HISTORY, 2012, 52 (02) : 183 - 201
  • [47] Blurring the dimensions of privacy? Law enforcement and trusted traveler programs
    Leese, Matthias
    COMPUTER LAW & SECURITY REVIEW, 2013, 29 (05) : 480 - 490
  • [48] Regulation of Big Data: Perspectives on strategy, policy, law and privacy
    Casanovas P.
    De Koker L.
    Mendelson D.
    Watts D.
    Health and Technology, 2017, 7 (4) : 335 - 349
  • [49] Law, privacy and information technology: a sleepwalk through the surveillance society?
    O'Brien, Mark
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2008, 17 (01) : 25 - 35
  • [50] Smart Multistage Privacy-Preserving Framework for Intrusion Detection in Multi-Domain SDN
    Padmanabhan, Jayashree
    Prabu, Saranya
    Balakrishnan, Saikrishna
    Vijay, Vinayaka Murthy
    IETE JOURNAL OF RESEARCH, 2024, 70 (07) : 6255 - 6271