154,525 research outputs found

    A Look at the Third-Party Identity Management Landscape

    Full text link

    Denial and distancing in discourses of development: shadow of the 'Third World' in New Zealand

    Get PDF
    Anxieties about development in New Zealand show up in a deep-rooted fear of the 'Third World' in the country. We examine how the term 'Third World' is deployed in media discourses in economic, social and environmental contexts and how this deployment results in a 'discursive distancing' from anything associated with the 'Third World'. Such distancing demonstrates a fragile national identity that struggles with the contradictions between the nation's desire to be part of the 'First World' of global capitalism and the growing disparities in health and wealth within it. The shadow of the 'Third World' prevents New Zealand from confronting the realities of its own inequities, which in turn comes in the way of a sound development agenda

    Sacred sites, contested rites/rights: contemporary pagan engagements with the past

    Get PDF
    Our Sacred Sites, Contested Rites/Rights project (www.sacredsites.org.uk) examines physical, spiritual and interpretative engagements of today’s Pagans with sacred sites, theorises ‘sacredness’, and explores the implications of pagan engagements with sites for heritage management and archaeology more generally, in terms of ‘preservation ethic’ vis a vis active engagement. In this paper, we explore ways in which ‘sacred sites’ --- both the term and the sites --- are negotiated by different interest groups, foregrounding our locations, as an archaeologist/art historian (Wallis) and anthropologist (Blain), and active pagan engagers with sites. Examples of pagan actions at such sites, including at Avebury and Stonehenge, demonstrate not only that their engagements with sacred sites are diverse and that identities --- such as that of ‘new indigenes’ --- arising therefrom are complex, but also that heritage management has not entirely neglected the issues: in addition to managed open access solstice celebrations at Stonehenge, a climate of inclusivity and multivocality has resulted in fruitful negotiations at the Rollright Stones.</p

    Ethical Bedrock Under a Changing Negotiation Landscape

    Get PDF
    Editors\u27 Note: Your dilemmas as a negotiator fall into two basic sets, “what’s possible?” and “what\u27s right?” The first is treated by many chapters in this book. Here, from his philosopher\u27s background, Gibson writes about the influence of morality on negotiations, and how we can think more clearly about what\u27s the right thing to do. This chapter should be read in conjunction with Carrie-Meadow’s chapter on The Morality of Compromise

    Cyber Babel: Finding the Lingua Franca in Cybersecurity Regulation

    Get PDF
    Cybersecurity regulations have proliferated over the past few years as the significance of the threat has drawn more attention. With breaches making headlines, the public and their representatives are imposing requirements on those that hold sensitive data with renewed vigor. As high-value targets that hold large amounts of sensitive data, financial institutions are among the most heavily regulated. Regulations are necessary. However, regulations also come with costs that impact both large and small companies, their customers, and local, national, and international economies. As the regulations have proliferated so have those costs. The regulations will inevitably and justifiably diverge where different governments view the needs of their citizens differently. However, that should not prevent regulators from recognizing areas of agreement. This Note examines the regulatory regimes governing the data and cybersecurity practices of financial institutions implemented by the Securities and Exchange Commission, the New York Department of Financial Services, and the General Data Protection Regulations of the European Union to identify areas where requirements overlap, with the goal of suggesting implementations that promote consistency, clarity, and cost reduction

    TRUSTWORTHINESS AS AN ECONOMIC ASSET

    Get PDF
    The evaluation of trust in economic decision making remains on the periphery of mainstream economic analysis and teaching. Yet business managers use trustworthiness in daily exchanges to create competitive advantages for their firms. An exploratory empirical test of Barney and HansenÂ’s three levels of trust (weak, semistrong, and strong) and Lewicki and BunkerÂ’s portfolio of governance mechanisms revealed that strong-form trust exists in day-to-day business relationships along with other governance mechanisms. Identity-based transactions were more prevalent than were weak trust market exchanges in important economic transactions.Institutional and Behavioral Economics, International Relations/Trade,

    Homo Datumicus : correcting the market for identity data

    Get PDF
    Effective digital identity systems offer great economic and civic potential. However, unlocking this potential requires dealing with social, behavioural, and structural challenges to efficient market formation. We propose that a marketplace for identity data can be more efficiently formed with an infrastructure that provides a more adequate representation of individuals online. This paper therefore introduces the ontological concept of Homo Datumicus: individuals as data subjects transformed by HAT Microservers, with the axiomatic computational capabilities to transact with their own data at scale. Adoption of this paradigm would lower the social risks of identity orientation, enable privacy preserving transactions by default and mitigate the risks of power imbalances in digital identity systems and markets

    Analytical Challenges in Modern Tax Administration: A Brief History of Analytics at the IRS

    Get PDF
    • 

    corecore