11 research outputs found
Cyber Law and Espionage Law as Communicating Vessels
Professor Lubin\u27s contribution is Cyber Law and Espionage Law as Communicating Vessels, pp. 203-225.
Existing legal literature would have us assume that espionage operations and âbelow-the-thresholdâ cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws attention to the similarities between the practices â the fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk legal reactions of the international community. In light of the convergence between peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage Operations (EOs) the two should be subjected to a single regulatory framework, one which recognizes the role intelligence plays in our public world order and which adopts a contextual and consequential method of inquiry. The paper proceeds in the following order: Part 2 provides a descriptive account of the unique symbiotic relationship between espionage and cyber law, and further explains the reasons for this dynamic. Part 3 places the discussion surrounding this relationship within the broader discourse on IW, making the claim that the convergence between EOs and LICOs, as described in Part 2, could further be explained by an even larger convergence across all the various elements of the informational environment. Parts 2 and 3 then serve as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn Manual 2.0 to compartmentalize espionage law and cyber law, and the deficits of their approach. The paper concludes by proposing an alternative holistic understanding of espionage law, grounded in general principles of law, which is more practically transferable to the cyber realmhttps://www.repository.law.indiana.edu/facbooks/1220/thumbnail.jp
Advances in Information Security and Privacy
With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue
Usable assured deletion in the cloud
The prevalence of cloud and storage-as-a-service has led to users storing and sharing data through such services. However, little is understood about one key element of data management in this new landscape, i.e., data deletion and more critically assured deletion. With regards to deletion, existing research has not explored the deletion needs of users, their preferences and the challenges they face. Nor is there any understanding of the challenges faced by cloud providers should they want to offer assured deletion. Usersâ deletion needs and their preferences are diverse and vary depending on the context. However, satisfying these needs may be limited to the properties of the infrastructure - what the infrastructure permits and does not. For instance, the cloud infrastructure has various features that may pose different challenges to meeting the needs of users and providing assured deletion. These features include virtualization, multi-tenancy, high availability and On-demand elasticity. The work presented in this thesis is the first to investigate these issues. Thus, it finds that usersâ motivation to delete are: privacy-, policy-, expertise- and storage-driven. They fail to delete because of the poorly designed interfaces, the way they perceive cloud deletion and lack of information about cloud deletion. Users want to have a choice in how their data is deleted, they want to be able to specify the type of deletion. Their deletion preferences are complex and may always change depending on the context of deletion, i.e., individually or socially. Regarding information about deletion, they want important information that may help them to delete or recover from failures to be easily accessible through the interface. They do not want essential information only to be restricted to privacy policies. Using these findings, this thesis provides a conceptual framework for the design of usable assured deletion in the cloud and then formulates user requirements for usable assured deletion. With regards to providers, by analysing the cloud infrastructure, this work provides a systematization of the challenges that providers face while attempting to assure deletion. It also identifies the cloud provider requirements for usable assured deletion. By considering both sets of requirements, i.e., user and provider requirements, this work provides user requirements and principles for usable assured deletion. Overall, the findings of this work formulate a solid grounding for the design and the development of cloud systems that assure deletion in a usable way. More importantly, it helps in the empowerment of users with regards to assured deletion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
382 p.Libro ElectrĂłnicoEach of us has been in the computing field for more than 40 years. The book is the product of a lifetime of observing and participating in the changes it has brought. Each of us has been both a teacher and a learner in the field.
This book emerged from a general education course we have taught at Harvard, but it is not a textbook. We wrote this book to share what wisdom we have with as many people as we can reach. We try to paint a big picture,
with dozens of illuminating anecdotes as the brushstrokes. We aim to entertain you at the same time as we provoke your thinking.Preface
Chapter 1 Digital Explosion
Why Is It Happening, and What Is at Stake?
The Explosion of Bits, and Everything Else
The Koans of Bits
Good and Ill, Promise and Peril
Chapter 2 Naked in the Sunlight
Privacy Lost, Privacy Abandoned
1984 Is Here, and We Like It
Footprints and Fingerprints
Why We Lost Our Privacy, or Gave It Away
Little Brother Is Watching
Big Brother, Abroad and in the U.S.
Technology Change and Lifestyle Change
Beyond Privacy
Chapter 3 Ghosts in the Machine
Secrets and Surprises of Electronic Documents
What You See Is Not What the Computer Knows
Representation, Reality, and Illusion
Hiding Information in Images
The Scary Secrets of Old Disks
Chapter 4 Needles in the Haystack
Google and Other Brokers in the Bits Bazaar
Found After Seventy Years
The Library and the Bazaar
The Fall of Hierarchy
It Matters How It Works
Who Pays, and for What?
Search Is Power
You Searched for WHAT? Tracking Searches
Regulating or Replacing the Brokers
Chapter 5 Secret Bits
How Codes Became Unbreakable
Encryption in the Hands of Terrorists, and Everyone Else
Historical Cryptography
Lessons for the Internet Age
Secrecy Changes Forever
Cryptography for Everyone
Cryptography Unsettled
Chapter 6 Balance Toppled
Who Owns the Bits?
Automated CrimesâAutomated Justice
NET Act Makes Sharing a Crime
The Peer-to-Peer Upheaval
Sharing Goes Decentralized
Authorized Use Only
Forbidden Technology
Copyright Koyaanisqatsi: Life Out of Balance
The Limits of Property
Chapter 7 You Canât Say That on the Internet
Guarding the Frontiers of Digital Expression
Do You Know Where Your Child Is on the Web Tonight?
Metaphors for Something Unlike Anything Else
Publisher or Distributor?
Neither Liberty nor Security
The Nastiest Place on Earth
The Most Participatory Form of Mass Speech
Protecting Good Samaritansâand a Few Bad Ones
Laws of Unintended Consequences
Can the Internet Be Like a Magazine Store?
Let Your Fingers Do the Stalking
Like an Annoying Telephone Call?
Digital Protection, Digital Censorshipâand Self-Censorship
Chapter 8 Bits in the Air
Old Metaphors, New Technologies, and Free Speech
Censoring the President
How Broadcasting Became Regulated
The Path to Spectrum Deregulation
What Does the Future Hold for Radio?
Conclusion After the Explosion
Bits Lighting Up the World
A Few Bits in Conclusion
Appendix The Internet as System and Spirit
The Internet as a Communication System
The Internet Spirit
Endnotes
Inde
Free Culture and the Digital Library Symposium Proceedings 2005: Proceedings of a Symposium held on October 14, 2005 at Emory University, Atlanta, Georgia.
Outlines the themes and contributions of the Free Culture and the Digital Library Symposium.The article provides a summary of the conflict of interests between those who seek to preserve ashared commons of information for society and those who seek to commodify information. Iintroduce a theoretical framework called Transmediation to help explain the changes in mediathat society is currently experiencing
Recommended from our members
Free Culture and the Digital Library Symposium Proceedings 2005
This book of proceedings includes seventeen papers from a symposium held at Emory University. The symposium papers discuss subjects relating to free culture in digital libraries
Recommended from our members
IN BLOCKCHAIN WE TRUST? The examination of an anti-counterfeiting solution
Product Counterfeiting is deemed a major and pertinent threat to the global luxury sector. The entanglement of luxury and counterfeiting has evolved into a complex problem for the modern milieu. This aim of exploring this topic as social phenomena seeks to expose the shadow economy of counterfeiting, unpack issues of intellectual property and the threat posed through the integration and adoption of blockchain technology as an anticounterfeiting solution and high trust system of exchange.
Luxury counterfeited brands offers a perspective which considers the complexities surrounding fashion consumption, the globalisation of brands, brand culture, and the connotations of luxury today, including its place in the criminological sphere. Academics call for studies pertaining to the under explored area of counterfeited luxury goods owing to a rise in the grey and copycat markets further catalysed by recent market demand for second-hand luxury goods (Wall and Large, 2010; Wang et al., 2020). The consumption of such goods not only pilfers innovation and affects industry but is entwined with a mirrored underworld of counterfeit production and consumption which has given rise to more sinister activities with linkages to organized crime, modern slavery, and terrorist activities.
Against this backdrop, this research will seek to achieve the following research aims:
A. Examine product counterfeiting of luxury goods as a social phenomenon
a. Critically examine the socio-economic, historical, and cultural implications of counterfeiting.
b. How are issues of copyright and trademark infringement impacting counterfeiters?
B. Examine Blockchain as an anti-counterfeiting solution and its enhancement of supply chain management.
a. Can Blockchain-based supply chains enable transparency and product traceability?
i. Can the integration of a blockchain solve issues of provenance?
ii. What is the value of blockchain-enabled services?
iii. Identify threats to adoption and regulation of blockchain technologies in the UK.
b. Can Blockchain enable a high-trust ecosystem?
i. Does block-tech ensure accountability and create trust?
ii. Examine the proposition that non-fungible tokens can create unprecedented models of ownership allowing for product circularity.
The study seeks to unveil the shadow industry of counterfeitingâs impact and to assess blockchain technologies merit as an anti-counterfeiting solution via an examination of issues existing in luxury goods supply chains. Thomasâ (2019) description of fractured supply chains and the utilisation of sub-contracting via offshore producers are central to establishing a case for enterprise blockchain-based solutions to combat counterfeiting and to create transparent supply chains. To achieve the above-mentioned aims, this literature review will highlight the impact of product counterfeiting through the provision of an ontological examination of counterfeiting with a particular focus on luxury goods. The penultimate section offers a sociological examination of the luxury goods industry, anticounterfeiting measures and addresses inherent issues overlooked in studies regarding counterfeiting of luxury and their interrelationship. The final section of the literary review will provide a theoretical examination of blockchain technology (block-tech) within an epistemological framework to assess block-tech capability to enhance supply chains to foster transparent and traceable chains, and, in doing so ameliorate the effects and risks of counterfeiting within the global luxury goods industry.
As this research is exploratory in nature, it will undertake a qualitative methodological approach, investigated through elite interviews and ethnographic data collection. The study will address this surge in the demand for counterfeit luxury goods and its accumulation into a trillion-dollar generating industry, as a social and criminological phenomenon. The researcher will examine issues pertaining to, and solutions of traceability, authentication, and supply chain provenance. In fulfilling the research objectives, it is imperative to identify current anti-counterfeiting strategiesâ effectiveness through a critical and comparative examination, with a focus on the distributed ledger technology (DLT) known as Blockchain. Henceforth, blockchain will be referenced throughout as âblock-techâ and otherwise âthe technologyâ or âblockchain technologyâ, or on its own âblockchainâ. Initial findings reveal the emergence of conscious consumers, a rise in re-commerce of luxury goods and a shift toward circularity within a microcosm of the industry