5,258 research outputs found

    Implementing Ethics for a Mobile App Deployment

    Get PDF
    This paper discusses the ethical dimensions of a research project in which we deployed a personal tracking app on the Apple App Store and collected data from users with whom we had little or no direct contact. We describe the in-app functionality we created for supporting consent and withdrawal, our approach to privacy, our navigation of a formal ethical review, and navigation of the Apple approval process. We highlight two key issues for deployment-based research. Firstly, that it involves addressing multiple, sometimes conflicting ethical principles and guidelines. Secondly, that research ethics are not readily separable from design, but the two are enmeshed. As such, we argue that in-action and situational perspectives on research ethics are relevant to deployment-based research, even where the technology is relatively mundane. We also argue that it is desirable to produce and share relevant design knowledge and embed in-action and situational approaches in design activities

    Data for AI in Network Systems Workshop Report

    Get PDF

    Insurance of Cyber Risks in International Transport

    Get PDF
    The international transport of goods, passengers and luggage is recently facing the threat of cyberattacks. The article is focused on the analysis of the possible cyber risks in the field of the international transport and their management created by the international governmental and non-governmental organisations. The international regulation of the cybersecurity has only recommendatory character and will be subject to future development. That’s the reason why should carriers pay greater attention to all possible cyber security measures. As the instrument of the reduction and mitigation of cyber risks could be used cyber-insurance. The insurance companies are offering insurance cover mainlyon individual base corresponding to the extent of protection required by the policyholder

    La protección de la intimidad y vida privada en Internet: los flujos de información y la integridad contextual en las redes sociales, (2004-2014)

    Get PDF
    La presente tesis explora las actuales preocupaciones relativas a las intromisiones en la intimidad y vida privada de las personas producidas en los entornos digitales; concretamente, en las redes sociales. Con el objetivo de entender y explicar los principales riesgos en el uso de estos servicios de Internet, se pretende identificar y evaluar los flujos de información y la transferencia de datos personales que tienen lugar en dichos entornos. Asimismo, tras reseñar los problemas a los que habitualmente se enfrentan los usuarios para preservar, activamente, su esfera privada, se aporta una propuesta destinada a solventar dicha situación de vulnerabilidad, luchando contra la desinformación imperante en dichos contextos. Subrayamos, así, el papel esencial que ostenta el conocimiento, no sólo para prevenir las citadas injerencias, sino para posibilitar que los individuos ejerzan su autodeterminación informativa. Diseño/Metodología/Aproximación: En nuestro estudio haremos uso de las técnicas de análisis de contenido y comparativo aplicadas a una muestra de los más relevantes artículos e informes científicos relativos a las interacciones entre tecnologías digitales de la Web 2.0 e intimidad y vida privada (Existe una cantidad creciente y substancial de literatura que aborda la confrontación entre ambas variables). Ulteriormente, mediante el marco teórico de la “integridad contextual” aportado por Helen Nissenbaum, evaluaremos cómo la naturaleza de la Web 2.0 cambia la ecuación de lo público y lo que se considera privado. A través de las lentes de esta aproximación, analizaremos los flujos de información que se ocultan bajo la estructura de las herramientas de la Web 2.0, centrándonos, primordialmente, en la red social Facebook. Hallazgos/Resultados: Las principales contribuciones de nuestro estudio se resumen en dos. En primer lugar, se consigue ilustrar el papel esencial que el ostenta conocimiento en la propia protección que los usuarios ejercen sobre sus informaciones privadas; ayudándoles a tomar decisiones críticas y conscientes en lo que respecta a la preservación de su ámbito privado. Como segundo aporte, destacamos la presentación de una serie de recomendaciones, así como de un sistema para proporcionar a los individuos ese flujo de información necesario para satisfacer sus deseos de autodeterminación informativa..

    Cybersecurity Vulnerability Analysis and Countermeasures of Commercial Aircraft Avionic Systems

    Get PDF
    Nowadays, most commercial aircraft use systems with innovative technologies and unprecedented infrastructure of avionics applications which include cyber technologies. Airplane passengers are now using aviation cyber technologies when purchasing tickets, checking in at the airline counter, passing through airport security, and connecting to Wi-Fi and the embedded inflight entertainment system. Cyber technologies and connectivity expose aviation to a dangerous and costly world of cyber threats that pose a major challenge of an attack which makes the risks difficult to understand or to define. In addition, the opportunities for attacks continually grow as new services and systems are developed. This thesis looks at understanding these cybersecurity threats and countermeasures of avionics network systems, and their associated defense safety mechanisms and risk analysis will help to pave a secure path toward the increase of protection of our future aviation

    Built to lie: Investigating technologies of deception, surveillance, and control

    Get PDF
    This article explores technological systems that dissimulate by design. Examples include untrustworthy hotel and workplace thermostats, digital applications to spy on workers and family members, and commercial and law-enforcement systems that surreptitiously collect mobile phone data. Rather than view such cases as exceptional, I argue that deceptive communication systems are hidden articulations of normal technological orders. If deception in itself is not the primary problem with such systems, then transparency alone cannot be the solution. As troubling as institutional opacity might be, an analysis of deceptive systems reveals more fundamental problems: imbalances in power and widespread acquiescence to corporate and state efforts to control individuals, groups, and their data. By moving beyond a quest for (or belief in) technological veracity, scholars could redirect attention to power inequalities and the pressing question of how to live together ethically

    Rehumanising the Self-Checkout Experience

    Full text link
    The adoption of self-checkout has been rapid, and is set to grow in grocery stores, where for many, the self-checkout machines will represent over 50% of all transactions, and beyond, in retail channels such as drug, fashion and home improvement. However, the implementation of self-checkout has its challenges, which can lead to losses and frustrated shoppers. In our second collaboration with Central Saint Martins, University of Arts London, we tasked their design students to find new design ideas that address these frustrations and reduce losses. As with all ECR reports, we never prescribe “solutions” but more, we promote new ways of thinking, principles, and frameworks that retailers can take from the report and use to generate discussion and new thinking in their business, where the five design ideas in this report can be the inspiration

    Surveillance and sousveillance on Facebook: Between empowerment and disempowerment

    Get PDF
    It seems there is no end to the growth of social media. Facebook, in particular, enjoys its hegemonic position as the leading social networking site, with more than one and a half billion global monthly active users throughout 2015. 71 per cent of all adult Internet users in the United States have used Facebook in 2014, which constitutes 58 per cent of the entire U.S. adult population. The website has permeated many aspects of social, cultural, and economic life. It has equipped its users with new ways of online social interaction, governments with new means of communicating policies with the public opinion, and businesses and advertisers with a platform for reaching consumers faster and on a broader-than-ever scale. David Lyon, the leading scholar of international surveillance studies, observes: "Facebook has quickly become a basic means of communicating – of 'connecting', as Facebook itself rightly calls it – and is now a dimension of daily life for millions" (p. 35).The effect of social networking and social media on mass popular culture of the modern world is undoubtedly immense. What is less clear, however, is the normative value and nature of Facebook. From its appearance on the Internet, the website has been an object of criticism pointing to the modern paradigm of individuals' lives being constantly exposed to the public gaze. The increasingly complex and decreasingly intelligible architecture of the globalising "technoscape" have created new means of surveillance. David Lyon (1994) has been at the forefront of this line of thinking, arguing together with Zygmunt Bauman that modernity brought about the rise of a new Panoptic "surveillance society". Lyon sees Facebook as an exemplary modern surveillance system, designed for the purpose of collecting data about its users and turning it into commercial profits. The revelations about the global surveillance of Facebook users by the U.S. National Security Agency, exposed by Edward Snowden in 2013, seem to be a case in point. The international uproar that followed inspired many to reflect critically on the nature of social networking sites and to question their safety

    The disciplinary power of predictive algorithms:a Foucauldian perspective

    Get PDF
    Big Data are increasingly used in machine learning in order to create predictive models. How are predictive practices that use such models to be situated? In the field of surveillance studies many of its practitioners assert that "governance by discipline" has given way to "governance by risk". The individual is dissolved into his/her constituent data and no longer addressed. I argue that, on the contrary, in most of the contexts where predictive modelling is used, it constitutes Foucauldian discipline. Compliance to a norm occupies centre stage; suspected deviants are subjected to close attention-as the precursor of possible sanctions. The predictive modelling involved uses personal data from both the focal institution and elsewhere ("Polypanopticon"). As a result, the individual re-emerges as the focus of scrutiny. Subsequently, small excursions into Foucauldian texts discuss his discourses on the creation of the "delinquent", and on the governmental approach to smallpox epidemics. It is shown that his insights only mildly resemble prediction as based on machine learning; several conceptual steps had to be taken for modern machine learning to evolve. Finally, the options available to those subjected to predictive disciplining are discussed: to what extent can they comply, question, or resist? Through a discussion of the concepts of transparency and "gaming the system" I conclude that our predicament is gloomy, in a Kafkaesque fashion
    corecore