72,091 research outputs found

    Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010

    Get PDF
    It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of ‘security’ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U

    Ethical and Social Aspects of Self-Driving Cars

    Full text link
    As an envisaged future of transportation, self-driving cars are being discussed from various perspectives, including social, economical, engineering, computer science, design, and ethics. On the one hand, self-driving cars present new engineering problems that are being gradually successfully solved. On the other hand, social and ethical problems are typically being presented in the form of an idealized unsolvable decision-making problem, the so-called trolley problem, which is grossly misleading. We argue that an applied engineering ethical approach for the development of new technology is what is needed; the approach should be applied, meaning that it should focus on the analysis of complex real-world engineering problems. Software plays a crucial role for the control of self-driving cars; therefore, software engineering solutions should seriously handle ethical and social considerations. In this paper we take a closer look at the regulative instruments, standards, design, and implementations of components, systems, and services and we present practical social and ethical challenges that have to be met, as well as novel expectations for software engineering.Comment: 11 pages, 3 figures, 2 table

    The Criminalisation of Migration in Europe: A State-of-the-Art of the Academic Literature and Research. CEPS Liberty and Security in Europe No. 61, October 2013

    Get PDF
    In the last 30 years, a clear trend has come to define modern immigration law and policy. A set of seemingly disparate developments concerning the constant reinforcement of border controls, tightening of conditions of entry, expanding capacities for detention and deportation and the proliferation of criminal sanctions for migration offences, accompanied by an anxiety on the part of the press, public and political establishment regarding migrant criminality can now be seen to form a definitive shift in the European Union towards the so-called ‘criminalisation of migration’. This paper aims to provide an overview of the ‘state-of-the-art’ in the academic literature and EU research on criminalisation of migration in Europe. It analyses three key manifestations of the so-called ‘crimmigration’ trend: discursive criminalisation; the use of criminal law for migration management; and immigrant detention, focusing both on developments in domestic legislation of EU member states but also the increasing conflation of mobility, crime and security which has accompanied EU integration. By identifying the trends, synergies and gaps in the scholarly approaches dealing with the criminalisation of migration, the paper seeks to provide a framework for on-going research under Work Package 8 of the FIDUCIA project

    Security and computer forensics in web engineering education

    Get PDF
    The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security should be an integral part of a Web Engineering curriculum. One aspect of Computer forensics investigates failures in security. Hence, students should be aware of the issues in forensics and how to respond when security failures occur; collecting evidence is particularly difficult for Web-based applications

    Individual and regulatory ethics: an economic-ethical and theoretical-historical analysis of ordoliberalism

    Get PDF
    Based on Foucault’s analysis of German Neoliberalism and his thesis of ambiguity, the following paper draws a two-level distinction between individual and regulatory ethics. The individual ethics level – which has received surprisingly little attention – contains the Christian foundation of values and the liberal-Kantian heritage of so called Ordoliberalism – as one variety of neoliberalism. The regulatory or formal-institutional ethics level on the contrary refers to the ordoliberal framework of a socio-economic order. By differentiating these two levels of ethics incorporated in German Neoliberalism, it is feasible to distinguish dissimilar varieties of neoliberalism and to link Ordoliberalism to modern economic ethics. Furthermore, it allows a revision of the dominant reception of Ordoliberalism which focuses solely on the formal-institutional level while mainly neglecting the individual ethics level

    Global Ethics and Nanotechnology: A Comparison of the Nanoethics Environments of the EU and China

    Get PDF
    The following article offers a brief overview of current nanotechnology policy, regulation and ethics in Europe and The People’s Republic of China with the intent of noting (dis)similarities in approach, before focusing on the involvement of the public in science and technology policy (i.e. participatory Technology Assessment). The conclusions of this article are, that (a) in terms of nanosafety as expressed through policy and regulation, China PR and the EU have similar approaches towards, and concerns about, nanotoxicity—the official debate on benefits and risks is not markedly different in the two regions; (b) that there is a similar economic drive behind both regions’ approach to nanodevelopment, the difference being the degree of public concern admitted; and (c) participation in decision-making is fundamentally different in the two regions. Thus in China PR, the focus is on the responsibility of the scientist; in the EU, it is about government accountability to the public. The formulation of a Code of Conduct for scientists in both regions (China PR’s predicted for 2012) reveals both similarity and difference in approach to nanotechnology development. This may change, since individual responsibility alone cannot guide S&T development, and as public participation is increasingly seen globally as integral to governmental decision-making

    Privacy is a process, not a PET: a theory for effective privacy practice

    Get PDF
    Privacy research has not helped practitioners -- who struggle to reconcile users' demands for information privacy with information security, legislation, information management and use -- to improve privacy practice. Beginning with the principle that information security is necessary but not sufficient for privacy, we present an innovative layered framework - the Privacy Security Trust (PST) Framework - which integrates, in one model, the different activities practitioners must undertake for effective privacy practice. The PST Framework considers information security, information management and data protection legislation as privacy hygiene factors, representing the minimum processes for effective privacy practice. The framework also includes privacy influencers - developed from previous research in information security culture, information ethics and information culture - and privacy by design principles. The framework helps to deliver good privacy practice by providing: 1) a clear hierarchy of the activities needed for effective privacy practice; 2) delineation of information security and privacy; and 3) justification for placing data protection at the heart of those activities involved in maintaining information privacy. We present a proof-of-concept application of the PST Framework to an example technology -- electricity smart meters
    • 

    corecore