Privacy threats in intimate relationships | Journal of Cybersecurity | Oxford Academic

peter.suber's bookmarks 2020-06-02

Summary:

"In many cases of intimate threat, the attacker has decision-making authority over the victim: granted either explicitly by law, or implicitly by the design of the system. Examples of explicit authority are parental rights and responsibilities to access a child’s data or to vicariously consent to monitoring on that child’s behalf [99], or a power of attorney for someone with diminished capacity. This authority may undermine consent-based models of privacy protection: the attacker both has authority to consent on behalf of the victim and is themselves a threat to the victim’s privacy, creating a circular (and nonprotective) situation [42]. And some legal frameworks explicitly permit or require data sharing between intimates, like the provision of student data to parents under FERPA, court-ordered alcohol monitoring for parental visitation, or state statutes that permit families to record their loved ones in nursing homes...."

Link:

https://academic.oup.com/cybersecurity/article/6/1/tyaa006/5849222

From feeds:

Consent and coercion » peter.suber's bookmarks

Tags:

consent consent.proxy competence paternalism privacy consent.conflicts

Date tagged:

06/02/2020, 09:28

Date published:

06/02/2020, 05:27