Filters








5,062 Hits in 9.1 sec

Anticipating policy and social implications of named data networking

Katie Shilton, Jeffrey A. Burke, KC Claffy, Lixia Zhang
2016 Communications of the ACM  
regulators, and network operators. ˽ For consumers, NDN can expand options for free speech, security, privacy, and anonymity, while raising new challenges for data retention and forgetting.  ...  This article discusses a proposed future Internet architecture that changes how data is delivered over the Internet.  ...  provide a valuable security building block not present in IP.  ... 
doi:10.1145/2915915 fatcat:2swqez7hzbglpnohmcka7vuajq

Human-Data Interaction: The Human Face of the Data-Driven Society [article]

Richard Mortier, Hamed Haddadi, Tristan Henderson, Derek McAuley, Jon Crowcroft
2015 arXiv   pre-print
We expose the challenges that HDI raises, organised into three core themes of legibility, agency and negotiability, and we present the HDI agenda to open up a dialogue amongst interested parties in the  ...  The increasing generation and collection of personal data has created a complex ecosystem, often collaborative but sometimes combative, around companies and individuals engaging in the use of these data  ...  LEGIBILITY At present, our interactions with online data systems are often opaque to us: there are few online analogues of physical world artefacts such as CCTV signage. 3 We argue that it is not enough  ... 
arXiv:1412.6159v2 fatcat:xfdjvgafr5fujnkmc3vsjebht4

Human-Data Interaction: The Human Face of the Data-Driven Society

Richard Mortier, Hamed Haddadi, Tristan Henderson, Derek McAuley, Jon Crowcroft
2014 Social Science Research Network  
We expose the challenges that HDI raises, organised into three core themes of legibility, agency and negotiability, and we present the HDI agenda to open up a dialogue amongst interested parties in the  ...  The increasing generation and collection of personal data has created a complex ecosystem, often collaborative but sometimes combative, around companies and individuals engaging in the use of these data  ...  LEGIBILITY At present, our interactions with online data systems are often opaque to us: there are few online analogues of physical world artefacts such as CCTV signage. 3 We argue that it is not enough  ... 
doi:10.2139/ssrn.2508051 fatcat:gl2pzcgpznbmlbwflf5qatwvna

Network-Layer Trust in Named-Data Networking

Cesar Ghali, Gene Tsudik, Ersin Uzun
2014 Computer communication review  
By opportunistically caching content within the network (in routers), NDN appears to be well-suited for large-scale content distribution and for meeting the needs of increasingly mobile and bandwidth-hungry  ...  One key feature of NDN is the requirement for each content object to be digitally signed by its producer. Thus, NDN should be, in principle, immune to distributing fake (aka "poisoned") content.  ...  The authors thank Paolo Gasti, Christopher Wood, CCR reviewers and several anonymous commenters for their feedback on earlier drafts of this paper.  ... 
doi:10.1145/2677046.2677049 fatcat:vjhto67a5vc75eoiwy4j7auwiy

Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research

Erin E Kenneally, Kimberly Claffy
2010 IEEE Security and Privacy  
The opaqueness, juxtaposed with this decade's proliferation of Internet security, scalability, sustainability, and stewardship issues, is a cause for concern for the integrity of the infrastructure as  ...  Both the legal and Internet research communities acknowledge that the concept of PII in Internet data is not clear -its definition is context-dependent, both in terms of technology and topology.  ... 
doi:10.1109/msp.2010.57 fatcat:fb6saht4rvdjtjvjsdkab4knvq

Big Data Surveillance: Introduction

Mark Andrejevic, Kelly Gates
2014 Surveillance & Society  
That is, the specific justification for collecting the data may come only after the fact, thus demanding that all data be collected and stored for its future use-value-its correlational and predictive  ...  potential-even if there are no envisioned uses for it at present.  ...  Disease monitoring partakes of the logic of predictive analytics: the mobilization of data collected in the past to model possible futures in the present.  ... 
doi:10.24908/ss.v12i2.5242 fatcat:di7hrd354vbs3knpzqp5yok5ue

Surveillance, Snowden, and Big Data: Capacities, consequences, critique

David Lyon
2014 Big Data & Society  
the quest for pattern-discovery is used to justify unprecedented access to data.  ...  Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid configurations.  ...  Acknowledgement The author wishes to thank Chris Parsons and Ian Kerr and also two anonymous reviewers for their constructive critique.  ... 
doi:10.1177/2053951714541861 fatcat:g3yz364arbaw5pca6ajhluxlpi

Shareveillance: Subjectivity between open and closed data

Clare Birchall
2016 Big Data & Society  
a more enabling assemblage of data and its affects.  ...  Looking at government open and closed data as case studies, this article demonstrates how 'shareveillance' produces an anti-political role for the public.  ...  Acknowledgements I would like to thank the editors of this special volume, the anonymous peer reviewers of Big Data and Society, and Gary Hall for their helpful advice on this article.  ... 
doi:10.1177/2053951716663965 fatcat:xsxpkl4iavcmjgczxjgfs4sobe

Data mining of biometric data: revisiting the concept of private life?

Crystalie Bourcha, Maria Louiza Deftou, AnthiKoskina no
2017 IUS ET SCIENTIA  
of privacy under the European Convention on Human Rights (ECHR) and of the existing EU data protection legislation in securing an adequate legal framework is facing a new ordeal.  ...  However, notwithstanding established data protection principles reserved also for biometric information, data mining practices, inherently intrusive in the private sphere of individuals, have generated  ...  and procedural conditions delimitating the access and use of the data retained by competent national authorities. 63 Regarding data security, the Directive lacked clear safeguards for the protection of  ... 
doi:10.12795/ietscientia.2017.i02.04 fatcat:pot5zsm445dtjakqvha3vb5xva

Introduction [chapter]

2018 The Big Data Agenda: Data Ethics and Critical Data Studies  
However, despite such claims for its relevance, the collection and analysis of big data is often opaque.  ...  Yet, it is often not clear what actual quantities of historic, contemporary, and future big data are implied. 5 For example, in 2014, the corporate service provider and consultancy International Data Corporation  ... 
doi:10.16997/book14.a fatcat:pgoihu4lpfdxlb23plhh4pk6ru

New Data Security Requirements and the Proceduralization of Mass Surveillance Law after the European Data Retention Case

Frederik J. Zuiderveen Borgesius, Axel Arnbak
2015 Social Science Research Network  
In addition, the Court developed three new criteria for assessing the level of data security required from a human rights perspective: security measures should take into account the risk of unlawful access  ...  to data, and the data's quantity and sensitivity.  ...  What are the implications of the Data Retention judgment for data collection as an interference with privacy, for data security requirements, and for the regulation of mass surveillance law in Europe?  ... 
doi:10.2139/ssrn.2678860 fatcat:m7hsgmkf3ncbbkgxokdaefdfli

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
; and presenting future perspectives and open research issues.  ...  and drastically improving the performance of applications that are offloaded to the data plane.  ...  [36] focused on stateful data planes and their security implications. There are two main objectives of this survey.  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

Data doxa: The affective consequences of data practices

Gavin JD Smith
2018 Big Data & Society  
It traces how repeated encounters with digital data operate to naturalise these entities, while often blindsiding their agentive properties and the ways they get implicated in processes of exploitation  ...  The 'data doxa' concept also accentuates the enculturation of many individuals into a data sharing habitus which frames digital technologies in simplistic terms as (a) panaceas for the problems associated  ...  Aside from the weighty economic imperatives of mass dataveillance and their implications for autonomy, the 2013 Edward Snowden revelations about the National Security Agency (NSA) PRISM program drew global  ... 
doi:10.1177/2053951717751551 fatcat:ga6piuwddjht3plhoc2u637aky

Beyond the EULA: Improving consent for data mining [article]

Luke Hutton, Tristan Henderson
2017 arXiv   pre-print
Finally, we propose some best practices for data collectors to ensure their data mining activities do not violate the expectations of the people to whom the data relate.  ...  In this chapter, we review the data collection and mining landscape, including commercial and academic activities, and the relevant data protection concerns, to determine the types of consent instruments  ...  Now, even when the terms of data collection and processing are understood as written, whether registering for an online service, or participating in academic research, it is not clear that the form of  ... 
arXiv:1701.07999v1 fatcat:scwtyyr7tvdepbk5y454g5g764

Big Data & Issues & Opportunities [article]

Van Asbroeck Benoit, Debussche Julien, Cesar Jasmien, De Moortel Isis, Mortier Simon
2020 Zenodo  
In light hereof, it is essential to keep in mind that the right to the protection of personal data is not an absolute right, but must be considered in relation to its function in society and be balanced  ...  Over the course of 17 articles, the Bird & Bird Team has presented a summary of the findings from their research conducted in the LeMO Project concerning legal, ethical and social challenges and opportunities  ...  The transparency principle in a big data context -where the complexity of the analytics renders the processing opaque -can become particularly challenging and implies that "individuals must be given clear  ... 
doi:10.5281/zenodo.4139824 fatcat:7tbrme7kd5fsrksqdbrkahufua
« Previous Showing results 1 — 15 out of 5,062 results