A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Anticipating policy and social implications of named data networking
2016
Communications of the ACM
regulators, and network operators. ˽ For consumers, NDN can expand options for free speech, security, privacy, and anonymity, while raising new challenges for data retention and forgetting. ...
This article discusses a proposed future Internet architecture that changes how data is delivered over the Internet. ...
provide a valuable security building block not present in IP. ...
doi:10.1145/2915915
fatcat:2swqez7hzbglpnohmcka7vuajq
Human-Data Interaction: The Human Face of the Data-Driven Society
[article]
2015
arXiv
pre-print
We expose the challenges that HDI raises, organised into three core themes of legibility, agency and negotiability, and we present the HDI agenda to open up a dialogue amongst interested parties in the ...
The increasing generation and collection of personal data has created a complex ecosystem, often collaborative but sometimes combative, around companies and individuals engaging in the use of these data ...
LEGIBILITY At present, our interactions with online data systems are often opaque to us: there are few online analogues of physical world artefacts such as CCTV signage. 3 We argue that it is not enough ...
arXiv:1412.6159v2
fatcat:xfdjvgafr5fujnkmc3vsjebht4
Human-Data Interaction: The Human Face of the Data-Driven Society
2014
Social Science Research Network
We expose the challenges that HDI raises, organised into three core themes of legibility, agency and negotiability, and we present the HDI agenda to open up a dialogue amongst interested parties in the ...
The increasing generation and collection of personal data has created a complex ecosystem, often collaborative but sometimes combative, around companies and individuals engaging in the use of these data ...
LEGIBILITY At present, our interactions with online data systems are often opaque to us: there are few online analogues of physical world artefacts such as CCTV signage. 3 We argue that it is not enough ...
doi:10.2139/ssrn.2508051
fatcat:gl2pzcgpznbmlbwflf5qatwvna
Network-Layer Trust in Named-Data Networking
2014
Computer communication review
By opportunistically caching content within the network (in routers), NDN appears to be well-suited for large-scale content distribution and for meeting the needs of increasingly mobile and bandwidth-hungry ...
One key feature of NDN is the requirement for each content object to be digitally signed by its producer. Thus, NDN should be, in principle, immune to distributing fake (aka "poisoned") content. ...
The authors thank Paolo Gasti, Christopher Wood, CCR reviewers and several anonymous commenters for their feedback on earlier drafts of this paper. ...
doi:10.1145/2677046.2677049
fatcat:vjhto67a5vc75eoiwy4j7auwiy
Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research
2010
IEEE Security and Privacy
The opaqueness, juxtaposed with this decade's proliferation of Internet security, scalability, sustainability, and stewardship issues, is a cause for concern for the integrity of the infrastructure as ...
Both the legal and Internet research communities acknowledge that the concept of PII in Internet data is not clear -its definition is context-dependent, both in terms of technology and topology. ...
doi:10.1109/msp.2010.57
fatcat:fb6saht4rvdjtjvjsdkab4knvq
Big Data Surveillance: Introduction
2014
Surveillance & Society
That is, the specific justification for collecting the data may come only after the fact, thus demanding that all data be collected and stored for its future use-value-its correlational and predictive ...
potential-even if there are no envisioned uses for it at present. ...
Disease monitoring partakes of the logic of predictive analytics: the mobilization of data collected in the past to model possible futures in the present. ...
doi:10.24908/ss.v12i2.5242
fatcat:di7hrd354vbs3knpzqp5yok5ue
Surveillance, Snowden, and Big Data: Capacities, consequences, critique
2014
Big Data & Society
the quest for pattern-discovery is used to justify unprecedented access to data. ...
Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid configurations. ...
Acknowledgement The author wishes to thank Chris Parsons and Ian Kerr and also two anonymous reviewers for their constructive critique. ...
doi:10.1177/2053951714541861
fatcat:g3yz364arbaw5pca6ajhluxlpi
Shareveillance: Subjectivity between open and closed data
2016
Big Data & Society
a more enabling assemblage of data and its affects. ...
Looking at government open and closed data as case studies, this article demonstrates how 'shareveillance' produces an anti-political role for the public. ...
Acknowledgements I would like to thank the editors of this special volume, the anonymous peer reviewers of Big Data and Society, and Gary Hall for their helpful advice on this article. ...
doi:10.1177/2053951716663965
fatcat:xsxpkl4iavcmjgczxjgfs4sobe
Data mining of biometric data: revisiting the concept of private life?
2017
IUS ET SCIENTIA
of privacy under the European Convention on Human Rights (ECHR) and of the existing EU data protection legislation in securing an adequate legal framework is facing a new ordeal. ...
However, notwithstanding established data protection principles reserved also for biometric information, data mining practices, inherently intrusive in the private sphere of individuals, have generated ...
and procedural conditions delimitating the access and use of the data retained by competent national authorities. 63 Regarding data security, the Directive lacked clear safeguards for the protection of ...
doi:10.12795/ietscientia.2017.i02.04
fatcat:pot5zsm445dtjakqvha3vb5xva
Introduction
[chapter]
2018
The Big Data Agenda: Data Ethics and Critical Data Studies
However, despite such claims for its relevance, the collection and analysis of big data is often opaque. ...
Yet, it is often not clear what actual quantities of historic, contemporary, and future big data are implied. 5 For example, in 2014, the corporate service provider and consultancy International Data Corporation ...
doi:10.16997/book14.a
fatcat:pgoihu4lpfdxlb23plhh4pk6ru
New Data Security Requirements and the Proceduralization of Mass Surveillance Law after the European Data Retention Case
2015
Social Science Research Network
In addition, the Court developed three new criteria for assessing the level of data security required from a human rights perspective: security measures should take into account the risk of unlawful access ...
to data, and the data's quantity and sensitivity. ...
What are the implications of the Data Retention judgment for data collection as an interference with privacy, for data security requirements, and for the regulation of mass surveillance law in Europe? ...
doi:10.2139/ssrn.2678860
fatcat:m7hsgmkf3ncbbkgxokdaefdfli
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends
[article]
2021
arXiv
pre-print
; and presenting future perspectives and open research issues. ...
and drastically improving the performance of applications that are offloaded to the data plane. ...
[36] focused on stateful data planes and their security implications. There are two main objectives of this survey. ...
arXiv:2102.00643v2
fatcat:izxi645kozdc5ibfsqp2y2foau
Data doxa: The affective consequences of data practices
2018
Big Data & Society
It traces how repeated encounters with digital data operate to naturalise these entities, while often blindsiding their agentive properties and the ways they get implicated in processes of exploitation ...
The 'data doxa' concept also accentuates the enculturation of many individuals into a data sharing habitus which frames digital technologies in simplistic terms as (a) panaceas for the problems associated ...
Aside from the weighty economic imperatives of mass dataveillance and their implications for autonomy, the 2013 Edward Snowden revelations about the National Security Agency (NSA) PRISM program drew global ...
doi:10.1177/2053951717751551
fatcat:ga6piuwddjht3plhoc2u637aky
Beyond the EULA: Improving consent for data mining
[article]
2017
arXiv
pre-print
Finally, we propose some best practices for data collectors to ensure their data mining activities do not violate the expectations of the people to whom the data relate. ...
In this chapter, we review the data collection and mining landscape, including commercial and academic activities, and the relevant data protection concerns, to determine the types of consent instruments ...
Now, even when the terms of data collection and processing are understood as written, whether registering for an online service, or participating in academic research, it is not clear that the form of ...
arXiv:1701.07999v1
fatcat:scwtyyr7tvdepbk5y454g5g764
Big Data & Issues & Opportunities
[article]
2020
Zenodo
In light hereof, it is essential to keep in mind that the right to the protection of personal data is not an absolute right, but must be considered in relation to its function in society and be balanced ...
Over the course of 17 articles, the Bird & Bird Team has presented a summary of the findings from their research conducted in the LeMO Project concerning legal, ethical and social challenges and opportunities ...
The transparency principle in a big data context -where the complexity of the analytics renders the processing opaque -can become particularly challenging and implies that "individuals must be given clear ...
doi:10.5281/zenodo.4139824
fatcat:7tbrme7kd5fsrksqdbrkahufua
« Previous
Showing results 1 — 15 out of 5,062 results