Balancing Privacy with Legitimate Surveillance and Lawful Data Access

The modern business world has overseen a massive expansion in global technological capacity. This expansion has allowed us to take great strides in electronic commerce and international communication. There are downsides, however. The new technologies have opened up a vast array of avenues for criminal activity. The new technologies also carry with them intrusive capabilities, and these, too, will require policies and laws that hold accountable those who abuse them. Legislators and policymakers the world over must remain abreast of current developments, being constantly mindful of the difficulties that will challenge any society that keenly embraces new technological capacity without putting in place appropriate regulatory mechanisms and legal regimes. The following overview reviews these themes in the context of cloud technology.

[1]  Kim-Kwang Raymond Choo Mobile Cloud Storage Users , 2014, IEEE Cloud Computing.

[2]  W. Powell,et al.  The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .

[3]  John F. Roddick,et al.  Legal and Technical Issues of Privacy Preservation in Data Mining , 2009, Encyclopedia of Data Warehousing and Mining.

[4]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[5]  Kim-Kwang Raymond Choo,et al.  A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[6]  Kim-Kwang Raymond Choo Cloud computing: Challenges and future directions , 2010 .

[7]  J. Rubenfeld The Right of Privacy , 1989 .

[8]  Daniel Castro How Much Will PRISM Cost the U.S. Cloud Computing Industry , 2013 .

[9]  Kim-Kwang Raymond Choo,et al.  The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[10]  Albert J. Marcella,et al.  Privacy and Cyber Forensics: An Australian Perspective , 2007 .

[11]  R. Sarre Journalists, invasion of privacy and the High Court decision in Lenah Game Meats , 2003 .

[12]  Kim-Kwang Raymond Choo,et al.  Impacts of increasing volume of digital forensic data: A survey and future research challenges , 2014, Digit. Investig..

[13]  Joseph K. Liu,et al.  Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.

[14]  Kim-Kwang Raymond Choo A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework , 2014 .