2,044 Hits in 6.6 sec

The fifteen year struggle of decentralizing privacy-enhancing technology [article]

Rolf Jagerman, Wendo Sabée, Laurens Versluis, Martijn de Vos, Johan Pouwelse
2014 arXiv   pre-print
The Tor network is used as a key comparison network in the main part of the report: a tabular overview of the major anonymous networking technologies in use today.  ...  Ever since the introduction of the internet, it has been void of any privacy. The majority of internet traffic currently is and always has been unencrypted.  ...  In recent years the need for privacy-enhancing technology has become more apparent.  ... 
arXiv:1404.4818v1 fatcat:7yfg6ske2fhybodp665gtkflny

Passwords: If We're So Smart, Why Are We Still Using Them? [chapter]

Cormac Herley, P. C. van Oorschot, Andrew S. Patrick
2009 Lecture Notes in Computer Science  
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same -such as the use of alphanumeric passwords.  ...  Passwords remain the dominant means of authentication on the Internet, even in the face of significant problems related to password forgetting and theft.  ...  We would like to thank Bob Blakley and Fabian Monrose for ideas during planning of the panel; participants of FC '09 for a lively and productive discussion; and M.  ... 
doi:10.1007/978-3-642-03549-4_14 fatcat:b6pjzxqyljfdtgzvjro64n7jmi

Privacy in the Political System: Perspectives from Political Science and Economics

Colin Bennett
2001 Social Science Research Network  
A parallel, though smaller, literature has also emerged in Britain with a similar tone and emphasis: Privacy (1974) Paul Sieghart, Privacy and Computers (1976) Patricia Hewitt, Privacy: The Information  ...  ., which contains hundreds of journals and 150,000 articles in the area of political science was consulted for the last fifteen years and relevant articles noted.  ...  The same can be said of the word, "politics." Political scientists have struggled for years to place some conceptual boundaries around their discipline.  ... 
doi:10.2139/ssrn.2230389 fatcat:a2bpy5n4hrcr7fexplj4djkrde

Dark Web and Its Impact in Online Anonymity and Privacy: A Critical Analysis and Review

Arbër S. Beshiri, Arsim Susuri
2019 Journal of Computer and Communications  
Anonymity, privacy and the possibility of non-detection are three factors that are provided by special browser such as TOR and I2P.  ...  It is given the number of daily anonymous users of the Dark Web (using TOR) in Kosovo as well as in the whole world for a period of time.  ...  Conflicts of Interest The authors declare no conflicts of interest regarding the publication of this paper.  ... 
doi:10.4236/jcc.2019.73004 fatcat:namvvd5ocre2rcuk6pqcuil5mm

New Governance, Chief Privacy Officers, and the Corporate Management of Information Privacy in the United States: An Initial Inquiry

2011 Law & Policy  
into entity-wide risk management goals through technology, decisionmaking processes, and the empowerment of distributed expertise networks throughout the firm.  ...  Specifically, it suggests the convergence of a set of practices adopted by privacy officers identified as "leaders," regarding both high-level corporate privacy management and the integration of privacy  ...  In contrast to the situation last documented fifteen years ago, in which corporate privacy practices were characterized by invisibility and disengagement, these interviews suggest proactive engagement  ... 
doi:10.1111/j.1467-9930.2011.00351.x fatcat:3zn3ctbo3fck3p24qxg6ta76hi

Ethical Review in the Age of Artificial Intelligence

John Heo
2021 AI Ethics Journal  
Thus, it is integral for the public to recognize the technology and make informed choices regarding the future of AI.  ...  Due to the widely applicable nature of this technology, the emergence of increasingly intelligent machines is poised to transform today's society.  ...  Elisa Warford for introducing me to the world of AI and ethics, as well as her support and guidance throughout the process.  ... 
doi:10.47289/aiej20210716-4 fatcat:m65dce67nzhdbfvngjkkfflrzu

The Economics of Privacy

Alessandro Acquisti, Curtis Taylor, Liad Wagman
2016 Journal of Economic Literature  
Second, there are theoretical and empirical situations where the protection of privacy can both enhance and detract from individual and societal welfare.  ...  We highlight how the economic analysis of privacy evolved over time, as advancements in information technology raised increasingly nuanced and complex issues.  ...  With regulations struggling to keep pace, industry competition has been behind both new privacy-enhancing and privacy-invasive technologies.  ... 
doi:10.1257/jel.54.2.442 fatcat:3edb5nk4bvelrcufqd4usvvhnm

From Peer-to-Peer Networks to Cloud Computing: How Technology Is Redefining Child Pornography Laws

Audrey Rogers
2012 Social Science Research Network  
App'x 91, 93 (3d Cir. 2009). 18 U.S.C. § 2251 (2012) (minimum fifteen year, maximum thirty year sentence).  ...  Napster lost in court against these companies and was eventually shut down. 98 The next technological milestone was the development of decentralized file-sharing systems. 99 The decentralized systems  ...  Optimally, Congress should revise the child pornography statutes to reflect technology; however, most likely this is politically unfeasible.  ... 
doi:10.2139/ssrn.2006664 fatcat:n64u6xl6zjbfvfoidqb7rpuxoq

The Prospects for Cyberocracy (Revisited)

David Ronfeldt, Danielle Varda
2008 Social Science Research Network  
"CYBEROCRACY IS COMING" [THE VIEW IN 1992 -ABRIDGED] 2 Perhaps it gets tiresome to read, as we have read for years, that advances in computing are going to change the world. But it's true.  ...  In turn, cyberocracy, by arising from the current revolution in information and communications technologies, may slowly but radically affect who rules, how, and why.  ...  ACKNOWLEDGEMENTS For comments on a prior version of the postscript, or for other insights, we thank:  ... 
doi:10.2139/ssrn.1325809 fatcat:3alalgvbsbasxbfb5vlcbvgnyu

Rethinking Privacy Online and Human Rights: The Internet's Standardisation Bodies as the Guardians of Privacy Online in the Face of Mass Surveillance

Adamantia Rachovitsa
2017 Social Science Research Network  
First, the effective protection of online privacy cannot be understood only in terms of compliance with legal frameworks but-in practice -that also needs to be secured through technological means.  ...  Second, in the area of online privacy informal law-making and international law converge in a distinctive way.  ...  Work in progress includes the integration of Privacy by Design 10 into the core Internet protocols that form Privacy by Design is different from privacy-enhancing technologies in that the former is a general  ... 
doi:10.2139/ssrn.2911978 fatcat:bypaxqqbjjeajjcp6lb7x2r2im

Organisational paradoxes of local e-government

Nita Cherry
2014 Journal of Contemporary Issues in Business and Government  
This article explores the complexities of realising the full potential of local e-government through the lens of paradox.  ...  Indeed, it has been argued that e-government crystallises the complex interdependencies and uncertainties of the sector more generally, challenging the power of expert knowledge and rational reform.  ...  And over the past fifteen years they have explored and argued the value of paradox of an alternative meta-theory, located in the paradigm of complexity thinking.Building on Cameron and Quinn's (1988)  ... 
doi:10.7790/cibg.v20i1.19 fatcat:6yxbkloh5fctppvvjkniymjg54

Privacy and the Modern Grid

Sonia McNeil
2011 Social Science Research Network  
Threats to individual privacy posed by evolving forms of technology are often realized belatedly, forcing Congress and the courts to struggle to keep pace.  ...  Comm. on Commerce on the Wireless Privacy Enhancement Act of 1999 and the Wireless Communications and Public. Safety Enhancement Act of 1999, 106th Cong. (1999) (statement of James X.  ...  Of the two models discussed here, the GPS Act would initially seem to provide stronger privacy protections because it requires a warrant in almost all cases. 199 Unlike the Right to Financial Privacy  ... 
doi:10.2139/ssrn.1928254 fatcat:t7vc6qaef5b5rfqqtxgplslsli

Social Media and Experiential Ambivalence

Jenny Davis
2012 Future Internet  
On the one hand, technology offers the potential to augment or even enhance personal and public life. On the other hand, technology looms with the potential to supplant or replace real experience.  ...  I argue that technological ambivalence is rooted primarily in the deeply embedded moral prescription to lead a meaningful life, and a related uncertainty about the role of new technologies in the accomplishment  ...  I would also like to thank the attendees of Theorizing the Web 2012 for their insightful feedback on an earlier version of this paper.  ... 
doi:10.3390/fi4040955 fatcat:paad5c2ezrcxnd6ttdyjlkltfi

Administration at the Supreme Court of Canada: Challenges and change in the Charter era

Emmett Macfarlane
2009 Canadian public administration  
This article presents a descriptive account of administration at the Supreme  ...  Staff members are, however, still considering technological issues. Further, matters of confidentiality, privacy and publication bans pose challenges to this endeavour.  ...  This reform coincides with the introduction of new technological changes in the courtroom.  ... 
doi:10.1111/j.1754-7121.2009.00057.x fatcat:qiwa4cm55jbv5fttrjdt5wd6du

Influencing User's Behavior Concerning Android Privacy Policy: An Overview

Ming Di, Shah Nazir, Fucheng Deng, Sikandar Ali
2021 Mobile Information Systems  
The permission granting mechanism is one of the defects imposed by the developers. Such assessing of defects does not allow the user to comprehend the implication of privacy for granting permission.  ...  The current study has presented an overview of the existing approaches, methods, and tools used for influencing user behavior concerning android privacy policy.  ...  privacy risk information enhances the readability of security information disclosure and assists users in analyzing the privacy aspects of various applications.  ... 
doi:10.1155/2021/3452700 fatcat:kojuiqdcgvezvgomn4zbf5ffba
« Previous Showing results 1 — 15 out of 2,044 results