S. D. Warren’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


The Right to Privacy
  • Article

January 2005

·

286 Reads

·

1,623 Citations

S.D. Warren

·

L.D. Brandeis



Residential Energy Monitoring and Computerized
  • Article
  • Full-text available

42 Reads

·

3 Citations

All new technologies have the potential to affect society in a complex man- ner, with both beneficial and detrimental consequences. The author considers an illustrative case study: a nonintrusive appliance load monitoring technique that can provide vital infor- mation to help avoid future energy crises, but can also be used for surveillance purposes. There appears to be a significant potential for the technology to be abused. The danger that the technology might eventually lead to an erosion of civil liberties and privacy rights leaves its developers in an ethical quandary. How should this technology be controlled? t one point in Woody Allen's futuristic comedy Sleeper, he and his revolutionary associates are discovered by government forces who monitor an increase in "the power function" where they are working. (l) This type of auto- mated discovery based on electric power usage is now technically possible and could become commonplace in the near future. A novel Nonincrusive Appliam Load Monitor has been designed to aid electric utilities in the collection of appliance end use data. (2,3) This device is installed at the revenue-meter socket of a residence (see Fig. 1) and, by using sophisticated signal analysis techniques on the voltage and current waveforms, determines the nature and exact usage characteristics of the individual appliances within the home which constitute the load. The monitor requires only the information externally available from measurements of the load; no entry into the home is necessary to place sensors on separate appliances or branch circuits; no appliance survey or other cooperation from the residents is required. A key feature of this new technique is its nonintrusive nature. The device can alternatively be installed on a utility pole at a distance from the site it is monitoring. With this mounting scheme, not even a momentary loss of electrical service is necessary for installation. From this unseen and unsuspected vantage point, the monitor has a view deep into the workings of the residence. After observing the residence for a short while, it generates a list of objects (appliances) and events (usages) that the occupants may consider completely private. The intended use of the device is completely benign. Utilities have important legitimate needs for end use load data. Previously available data collection methods are expensive and clumsy compared to the nonintrusive technique, so it is natural for utility load researchers to welcome more sophisticated tools for instru- mentation and data collection. The load monitor is currently being packaged into the form of a commercial product, and initial interest from utilities suggests that tens of thousands may be installed within the first five years of manufacture. For the scientist or engineer developing the nonintrusive load monitor, however, its development, promulgation, and commer- cialization present a rather interesting case study of the ethical

Download

Citations (4)


... The formulation of the right to privacy in the contemporary era is widely credited to Warren and Brandeis' formulation from 1890 as an interest "to be let alone". 47 Yet privacy in the digital domain differs to a considerable degree from privacy in the non-digital domain. For instance, Richards has declared privacy online "dead" or "dying". ...

Reference:

Framing the right not to use the Internet
The Right to Privacy
  • Citing Article
  • January 2005

... The little girl in the center of the photograph was stark naked and badly burned; she had torn off all of her clothes in a futile attempt to escape the searing effects of the napalm. 23 Suppose that the girl's legal guardians consented to the publishing of the photograph for monetary compensation. Even though consent has been offered it is not clear that the girl's privacy claims have been appropriately set aside. ...

Privacy, photography, and the press
  • Citing Article
  • February 1998

Harvard Law Review

... The NILM module also represents a key element to enable backward compatibility, since it allows identifying (based on electrical signature) the appliances which are running, even if they are not equipped with a plug with sensor and communication capabilities. The theoretical NILM approach determines when a specific appliance is turned ON based just on its electrical signature, by applying non-supervised Digital Signal Processing methods to the overall electrical signal (Warren and Brandeis, 1989). However, due to the complexity of such methods, in the ENERsip project the user will inform the NILM module about the appliance which has just been turned ON in order to help it to learn its electrical signature, based on the data received from each plug. ...

Residential Energy Monitoring and Computerized

... The protection of personal data in AI systems presents multifaceted challenges that extend beyond traditional privacy concerns [63,64,113]. In Ghana, these challenges are particularly acute in the healthcare sector, where sensitive medical data intersects with AI applications [85,89]. ...

The Right to Privacy. The Implicit Made Explicit
  • Citing Article