Tekijänoikeuden erikoiskirjasto

The Right to Root : Constructing a Claim to Control Devices from the Right to Privacy
Muistilista on tyhjä
Vis
Henkilönnimi
  • van Daalen, Ot, kirjoittaja.
Nimeke- ja vastuullisuusmerkintö
  • The Right to Root : Constructing a Claim to Control Devices from the Right to Privacy
Julkaistu
  • Deutsche Gesellschaft für Recht und Informatik e.V. (DGRI), Frankfurt am Main : 2024.
Ulkoasutiedot
  • 1 verkkoaineisto
Sarjamerkintö ei-lisäkirjausmuodossa
  • Journal of Intellectual Property, Information Technology and Electronic Commerce Law, ISSN 2190-3387 ; 14(4)
Huomautus sisällöstä, tiivistelmä tms.
  • Empowering people with digital tools has been an enduring ideal throughout the history of computing. In some of the earlier visions, this was not only a matter of making life easier, it was also a matter of people gaining control over their digital tools. One solution to this problem which has been suggested is to provide users with a manual override to gain full control over a device, something called gaining ‘root’ – hence the ‘Right to Root’. Yet, there are no policymakers who have seriously entertained this as a possibility. For people pushing this right at a policy level, it would therefore be helpful to know whether this Right to Root can be constructed from human rights. In this article, I explore the European human rights-based arguments for a Right to Root, focusing on the right to privacy under the European Convention for Human Rights and the Charter of Fundamental Rights. I first discuss the origins of this ideal of gaining control over your own devices. I then show how users over the years have gained less control and how the Right to Root could enable them to regain control. I then explore how the Right to Root could be constructed from the right to privacy under the Convention and the Charter, by understanding it as a way to protect the values of autonomy, self-determination and seclusion. I conclude that a Right to Root can be grounded in the human right to privacy, but that further research is necessary to balance it with other interests, such as cybersecurity, traffic safety, health and intellectual property.
Asiasana
Sarjalisäkirjaus - yhtenäistetty nimeke
  • Journal of Intellectual Property, Information Technology and Electronic Commerce Law, 2190-3387 ; 14(4)
Elektronisen aineiston sijainti ja käyttö (URI)
  • https://www.jipitec.eu/jipitec/article/view/23 Linkki verkkoaineistoon
*000      ab a        ar
*00124541
*008      s2024    gw     e|    |||||0|eng |            
*040  $aFI-CUTE$bfin$erda
*041  $aeng
*1001 $avan Daalen, Ot,$ekirjoittaja.
*24514$aThe Right to Root :$bConstructing a Claim to Control Devices from the Right to Privacy /$cOt van Daalen.
*264 1$aFrankfurt am Main :$bDeutsche Gesellschaft für Recht und Informatik e.V. (DGRI),$c2024.
*300  $a1 verkkoaineisto
*336  $ateksti$btxt$2rdacontent
*337  $atietokonekäyttöinen$bc$2rdamedia
*338  $averkkoaineisto$bcr$2rdacarrier
*4901 $aJournal of Intellectual Property, Information Technology and Electronic Commerce Law,$x2190-3387 ;$v14(4)
*520  $aEmpowering people with digital tools has been an enduring ideal throughout the history of computing. In some of the earlier visions, this was not only a matter of making life easier, it was also a matter of people gaining control over their digital tools. One solution to this problem which has been suggested is to provide users with a manual override to gain full control over a device, something called gaining ‘root’ – hence the ‘Right to Root’. Yet, there are no policymakers who have seriously entertained this as a possibility. For people pushing this right at a policy level, it would therefore be helpful to know whether this Right to Root can be constructed from human rights. In this article, I explore the European human rights-based arguments for a Right to Root, focusing on the right to privacy under the European Convention for Human Rights and the Charter of Fundamental Rights. I first discuss the origins of this ideal of gaining control over your own devices. I then show how users over the years have gained less control and how the Right to Root could enable them to regain control. I then explore how the Right to Root could be constructed from the right to privacy under the Convention and the Charter, by understanding it as a way to protect the values of autonomy, self-determination and seclusion. I conclude that a Right to Root can be grounded in the human right to privacy, but that further research is necessary to balance it with other interests, such as cybersecurity, traffic safety, health and intellectual property.
*650 7$aihmisoikeudet$2yso/fin$0http://www.yso.fi/onto/yso/p2402
*650 7$asähköiset palvelut$2yso/fin$0http://www.yso.fi/onto/yso/p23542
*650 7$atietosuoja$0http://www.yso.fi/onto/yso/p3636$2yso/fin
*650 7$ayksilönsuoja$2yso/fin$0http://www.yso.fi/onto/yso/p3637
*650 7$aEU-oikeus$0http://www.yso.fi/onto/yso/p20733$2yso/fin
*830 0$aJournal of Intellectual Property, Information Technology and Electronic Commerce Law,$x2190-3387 ;$v14(4)
*85640$uhttps://www.jipitec.eu/jipitec/article/view/23$yLinkki verkkoaineistoon
^
Tästä teoksesta ei ole arvioita.
Näpäytä kun haluat kirjoittaa ensimmäisen arvion.
Vis
Lähetä