Filters








690 Hits in 6.3 sec

Issues of copyright enforcement in the digital environment: p2p networking and darknet

Д. О. Єліферов
2017 Odesa National University Herald Jurisprudence  
This article will provide a basic overview of the P2P Networking, its development into darknet, and the legal aspects and means of copyright enforcement will be analyzed.  ...  Furthermore, the correlation between copyright and right of privacy in digital environment will be shown.  ...  P2P Networking as a new threat for copyright holders.  ... 
doi:10.18524/2304-1587.2017.1(30).126523 fatcat:ya4c2msgdzdkdcm7ld736jei24

Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems

Francesca Musiani
2011 tripleC: Communication, Capitalism & Critique  
Yet, it also suggests that the richness of today's landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy  ...  It argues that, within P2P systems, privacy is increasingly coinciding with "mere" invisibility vis-à-vis the rest of the Internet ecosystem because of a trend that has shaped the recent history of P2P  ...  and invasive copyright enforcement strategies have seen the light in the last few years, that share the common trait of relying on private mechanisms of surveillance for their execution and control.  ... 
doi:10.31269/triplec.v9i2.248 fatcat:bph66ysaincarozqugum7tum2e

Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems

Francesca Musiani
2011 tripleC: Communication, Capitalism & Critique  
Yet, it also suggests that the richness of today's landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy  ...  It argues that, within P2P systems, privacy is increasingly coinciding with "mere" invisibility vis-à-vis the rest of the Internet ecosystem because of a trend that has shaped the recent history of P2P  ...  and invasive copyright enforcement strategies have seen the light in the last few years, that share the common trait of relying on private mechanisms of surveillance for their execution and control.  ... 
doi:10.31269/vol9iss2pp126-140 fatcat:rexjdgcapnbfnfyqrrjpysead4

Security and privacy issues in P2P streaming systems: A survey

Gabriela Gheorghe, Renato Lo Cigno, Alberto Montresor
2010 Peer-to-Peer Networking and Applications  
Starting from existing analyses and security models in the related literature, we give an overview on security and privacy considerations for P2P streaming systems.  ...  Success always implies increased concerns about security, protection, privacy and all the other 'side' properties that transform an experimental application into a service.  ...  Mapping and enforcing the connection between identities and access rights, access control strongly requires mechanisms for identity and reputation management.  ... 
doi:10.1007/s12083-010-0070-6 fatcat:hgg7fujecbdvpd7647lttvh2qm

Toward Blockchain Technology in the Energy Environment

Yahia Baashar, Gamal Alkawsi, Ammar Ahmed Alkahtani, Wahidah Hashim, Rina Azlin Razali, Sieh Kiong Tiong
2021 Sustainability  
An analysis of fifty-seven carefully reviewed studies revealed that the emerging blockchain which provides privacy-protection technologies in cryptography and other areas that can be integrated to address  ...  The problem is that in the field of the innovative technology of blockchain and its applications, with the energy sector still in the developmental stages, there is still a need for more research to understand  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.  ... 
doi:10.3390/su13169008 fatcat:ptydomkoircfblpxthsna5dife

Privacy and personalisation in a smart space for learning

Tomaz Klobucar, Vanja Senicar, Borka Jerman Blazic
2004 International Journal of Continuing Engineering Education and Life-Long Learning  
We present privacy threats and requirements in smart spaces for learning with focus on a learner, we model learner profile data that are necessary for privacy protection, and propose privacy-enhancing  ...  In this paper we discuss privacy aspects of personalisation and adaptation in smart spaces for learning.  ...  We especially thank Peter Dolog for providing Figure 2 and for the discussion that led to several improvements, and Bernd Simon.  ... 
doi:10.1504/ijceell.2004.005728 fatcat:ll5w6umojverpbuntlpwt5icme

Cachet

Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, Apu Kapadia
2012 Proceedings of the 8th international conference on Emerging networking experiments and technologies - CoNEXT '12  
However, this success has come at the cost of user privacy; in today's OSNs, users are not in control of their own data, and depend on OSN operators to enforce access control policies.  ...  A multitude of privacy breaches has spurred research into privacy-preserving alternatives for social networking, exploring a number of techniques for storing, disseminating, and controlling access to data  ...  The Write and Append policies are enforced by controlling access to the corresponding signature keys.  ... 
doi:10.1145/2413176.2413215 dblp:conf/conext/NilizadehJMBK12 fatcat:kkseqkv5yjft7j6ukx5gmiha2i

Legal and Technical Issues Management Framework for Peer-to-Peer Networks

Elaine Lawrence, John Lawrence, Gordana Culjak
2006 Journal of Theoretical and Applied Electronic Commerce Research  
Practitioners of P2P businesses must be aware of legal requirements and the risks involved in doing business in cyberspace. The digital economy develops at e-speed but the law does not.  ...  This paper reviews the impact of peer-to-peer ebusiness models in a legal and technical context with a view to formulating technical and legal policy suggestions for technologists, scientists, managers  ...  These P2P systems allow users worldwide access to a huge variety of information but with a level of privacy and security not possible in the present client-server architecture of the web [1] .  ... 
doi:10.3390/jtaer1010004 fatcat:4aqvyyei2fa4vnqbwdtqijq2mm

A Prototype Framework for Assessing Information Provenance in Decentralised Social Media: The EUNOMIA Concept

Lazaros Toumanidis, Ryan Heartfield, Panagiotis Kasnesis, George Loukas, Charalampos Patrikakis
2019 Zenodo  
Users of traditional centralised social media networks have limited knowledge about the original source of information and even less about its trustworthiness and how this information has spread and been  ...  In this paper, we introduce EUNOMIA, an open source, decentralised framework that aims at providing information about social media content and context in an intermediary-free approach and in a way that  ...  Acknowledgment Work presented in this paper has received funding from the European Union's H2020 research and innovation programme under EUNOMIA project, grant agreement No. 825171.  ... 
doi:10.5281/zenodo.3967069 fatcat:2vfm2go6hbdsdjppxmxchyj37m

Protecting Consumer Privacy in an Era of Rapid Change–A Proposed Framework for Businesses and Policymakers

FTC Staff
2011 Journal of Privacy and Confidentiality  
in enforcing privacy laws, the Commission, joined by a number of its international counterparts, launched the Global Privacy Enforcement Network ("GPEN") in March of 2010. 44 GPEN, a network of privacy  ...  ment Arrangement, a multilateral cooperation network for APEC privacy enforcement authorities.  ...  comment on a proposed new framework for how companies should protect consumers' privacy.  ... 
doi:10.29012/jpc.v3i1.596 fatcat:zo3j46c6o5e5hgm6ror3p4zqdi

Data Hemorrhages in the Health-Care Sector [chapter]

M. Eric Johnson
2009 Lecture Notes in Computer Science  
We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft.  ...  Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks.  ...  For health-care providers, the first step in reducing such crime is better protection of PHI by: 1) controlling access within the enterprise to PHI; 2) securing networks and computers from direct intruders  ... 
doi:10.1007/978-3-642-03549-4_5 fatcat:dqvsqdkprzgpvpt55igk67rna4

Governance in Namespaces

Stefan Bechtold
2003 Social Science Research Network  
Early P2P systems used a centralized namespace for locating files in the network.  ...  If, for example, a P2P network wants to use IP addresses to identify and locate peers in its network, it is free to do so, as the IP address space does not control the purpose for which it is used.  ...  If one single entity in a namespace knows about all actions occurring within the namespace, it is an optimal starting point for namespace control.  ... 
doi:10.2139/ssrn.413681 fatcat:tybvkidaanfbrnomfsseyhyxyu

The Data-Laundromat?

T. Gottschalk
2020 European Data Protection Law Review  
Based on the outcomes, the author proposes a change in the LED and discusses a centralised institution to govern access to novel data driven technology.  ...  Failure to provide legal bases on the national level paired with shortcomings both in the GDPR and Directive EU-2016/680 (LED) result in severe risks for fundamental rights of EU citizens.  ...  P2P There are myriads of peer-to-peer (p2p)-networks that can provide investigators with publicly available information. 50 Classic p2p-sharing-networks such as Kazaa, Limewire or Torrents are usually  ... 
doi:10.21552/edpl/2020/1/6 fatcat:fujzowg7hbcjrputfbz6c4qf5u

Blockchain and the Tokenization of the Individual: Societal Implications

Morrow, Zarrebini
2019 Future Internet  
in the form of data breaches or simply a monetization of our data without our permission and/or incentives to participate in this emerging decentralization of structures.  ...  We are living in a world where the very systems upon which trust is based are being challenged by new and exciting paradigm shifts.  ...  In the area of personal data, there is a trade-off between the claim that private data ownership would enhance privacy protection and sovereignty over one's own data and the public's need for data access  ... 
doi:10.3390/fi11100220 fatcat:jmbshaemubeq7o4vzslqyhaz54

Detection of fintech P2P lending issues in Indonesia

Ryan Randy Suryono, Indra Budi, Betty Purwandari
2021 Heliyon  
, and restriction of data access, including personal data protection, personal data fraud, illegal fintech lending, and Product marketing ethics.  ...  The essence of this study is to discuss the landscape of fintech P2P lending in Indonesia from Indonesian Online News data, explore cases of fintech p2p lending in Indonesia, and understand the rules and  ...  Additional information No additional information is available for this paper.  ... 
doi:10.1016/j.heliyon.2021.e06782 pmid:33981873 pmcid:PMC8082208 fatcat:rmh5agphsrdszctwaq7jwgyb6y
« Previous Showing results 1 — 15 out of 690 results