1,080,310 research outputs found

    Political Micro-Targeting in Kenya: An Analysis of the Legality of Data-Driven Campaign Strategies under the Data Protection Act

    Get PDF
    oai:ojs2.strathmore.edu:article/61The 2013 general election marked the entry of data-driven campaigning into Kenyan politics as political parties begun collecting and storing voter data. More sophisticated techniques were deployed in 2017 as politicians retained the services of data analytics firms such as Cambridge Analytica, accused of digital colonialism and undermining democracies. It is alleged that political parties engaged in regular targeting and more intrusive micro-targeting, facilitated by the absence of a data protection legal framework.The promulgation of the Data Protection Act, 2019, ostensibly remedied this gap. This paper analyses whether, and to what extent, political parties can rely on the same–or similar– regular targeting and micro-targeting techniques in subsequent elections. While regular targeting differs from micro-targeting as the latter operates at a more granular level, both comprise of three steps- collecting a voter’s personal data, profiling them, and sending out targeted messages. This paper considers the legality of each of these steps in turn. It finds that going forward, such practices will likely require the consent of the data subject. However, the Act provides for several exceptions which political parties could abuse to circumvent this requirement. There are also considerable loopholes that allow open access to voter data in the electoral list as well as the personal data of the members of a rival political party. The efficacy of the Data Protection Act will largely rest on whether the Data Protection Commissioner will interpret it progressively and hold political parties to account

    Understanding Shoulder Surfing in the Wild: Stories from Users and Observers

    Get PDF
    Research has brought forth a variety of authentication systems to mitigate observation attacks. However, there is little work about shoulder surfing situations in the real world. We present the results of a user survey (N=174) in which we investigate actual stories about shoulder surfing on mobile devices from both users and observers. Our analysis indicates that shoulder surfing mainly occurs in an opportunistic, non-malicious way. It usually does not have serious consequences, but evokes negative feelings for both parties, resulting in a variety of coping strategies. Observed data was personal in most cases and ranged from information about interests and hobbies to login data and intimate details about third persons and relationships. Thus, our work contributes evidence for shoulder surfing in the real world and informs implications for the design of privacy protection mechanisms

    PERLINDUNGAN HUKUM BAGI KONSUMEN TERHADAP PENGGUNA KOSMETIK YANG TIDAK TERDAFTAR BADAN PENGAWASAN OBAT DAN MAKANAN (BPOM) (Studi Penelitian Di Kota Idi Kabupaten Aceh Timur)

    Get PDF
    Abstract/Digest Legal protection is very important for consumers. The government has provided legal protection for consumers as regulated in Article 4 of Law Number 8 of 1999 concerning Consumer Protection. Cosmetic consumers in Idi City use a lot of cosmetic products that are not registered with BPOM, as a result, skin damage occurs after the use is made by consumers. The people of Idi City as consumers of cosmetics are easily tempted by the effects of creams that can whiten the skin in a short period of time and the community does not have awareness of the legal protection rights they have. This study aims to identify and explain the legal protection for consumers who use cosmetics that are not registered with BPOM, to find out and explain the obstacles to BBPOM Banda Aceh in legal protection of consumers using cosmetics that are not registered at BPOM and BBPOM Banda Aceh efforts in resolving barriers to consumers. cosmetic users who are not registered with BPOM. This study uses a qualitative method with an empirical juridical approach. The data were obtained through library research and supported by field research. Data analysis was done descriptively (descriptive analysis). Based on the results of the study, it is known that the implementation of legal protection for consumers has not been implemented optimally. Barriers to consumer protection are the lack of knowledge of consumers and business actors about regulations related to cosmetics. The efforts made are prevention strategies (socialization with the community), surveillance strategies and enforcement strategies. It is suggested to the public to be wiser in choosing cosmetic products. Legal awareness for business actors in producing illegal cosmetics and carrying out their obligations as business actors in accordance with the laws and regulations and BPOM further enhances the cosmetic reducer in the market. Keywords: Legal Protection, Consumers, Cosmetics

    Why Johnny Fails to Protect his Privacy

    Get PDF
    Albeit people worldwide cry out for the protection of their privacy, they often fail to successfully protect their private data. Possible reasons for this failure that have been identified in previous research include a lack of knowledge about possible privacy consequences, the negative outcome of a rational cost-benefit analysis, and insufficient ability for protection on the users’ side. However, these findings mainly base on theoretical considerations or results from quantitative studies, and no comprehensive explanation for users’ privacy behavior has been found so far. We thus conducted an interview study with 24 participants to qualitatively investigate what are (1) users’ mental models of privacy consequences, (2) obstacles for privacy protection, and (3) strategies for privacy protection. Our results provide evidence for all possible explanations: We find that most of our participants are indeed unaware of most consequences that could result from not protecting their privacy besides personalized advertisement and financial loss. We also identify several obstacles for privacy protection, such as protection being too much effort, too complicated, users lacking knowledge, or social aspects. Protection strategies mostly base on reducing the amount of data disclosed and most users refrain from using advanced PETs. We further identified additional factors which influence whether people adopt measures to protect their privacy and propose a model which subsumes all factors that are relevant for people’s decision to apply protection measures

    EPMA position paper in cancer:current overview and future perspectives

    Get PDF
    At present, a radical shift in cancer treatment is occurring in terms of predictive, preventive, and personalized medicine (PPPM). Individual patients will participate in more aspects of their healthcare. During the development of PPPM, many rapid, specific, and sensitive new methods for earlier detection of cancer will result in more efficient management of the patient and hence a better quality of life. Coordination of the various activities among different healthcare professionals in primary, secondary, and tertiary care requires well-defined competencies, implementation of training and educational programs, sharing of data, and harmonized guidelines. In this position paper, the current knowledge to understand cancer predisposition and risk factors, the cellular biology of cancer, predictive markers and treatment outcome, the improvement in technologies in screening and diagnosis, and provision of better drug development solutions are discussed in the context of a better implementation of personalized medicine. Recognition of the major risk factors for cancer initiation is the key for preventive strategies (EPMA J. 4(1):6, 2013). Of interest, cancer predisposing syndromes in particular the monogenic subtypes that lead to cancer progression are well defined and one should focus on implementation strategies to identify individuals at risk to allow preventive measures and early screening/diagnosis. Implementation of such measures is disturbed by improper use of the data, with breach of data protection as one of the risks to be heavily controlled. Population screening requires in depth cost-benefit analysis to justify healthcare costs, and the parameters screened should provide information that allow an actionable and deliverable solution, for better healthcare provision

    Advanced e-Infrastructures for civil protection applications : the CYCLOPS project

    Get PDF
    During the full cycle of the emergency management, Civil Protection operative procedures involve many actors belonging to several institutions (civil protection agencies, public administrations, research centers, etc.) playing different roles (decision-makers, data and service providers, emergency squads, etc.). In this context the sharing of information is a vital requirement to make correct and effective decisions. Therefore a European-wide technologi- cal infrastructure providing a distributed and coordinated access to different kinds of resources (data, information, services, expertise, etc.) could enhance existing Civil Protection applications and even enable new ones. Such European Civil Protection e-Infrastructure should be designed taking into account the specific requirements of Civil Protection applications and the state-of-the-art in the scientific and technological disciplines which could make the emergency management more effective. In the recent years Grid technologies have reached a mature state providing a platform for secure and coordinated resource sharing between the participants collected in the so-called Virtual Organizations. Moreover the Earth and Space Sciences Informatics provide the conceptual tools for modeling the geospatial information shared in Civil Protection applications during its entire lifecycle. Therefore a European Civil Protection e-infrastructure might be based on a Grid platform enhanced with Earth Sciences services. In the context of the 6th Framework Programme the EU co-funded Project CYCLOPS (CYber-infrastructure for CiviL protection Operative ProcedureS), ended in December 2008, has addressed the problem of defining the re- quirements and identifying the research strategies and innovation guidelines towards an advanced e-Infrastructure for Civil Protection. Starting from the requirement analysis CYCLOPS has proposed an architectural framework for a European Civil Protection e-Infrastructure. This architectural framework has been evaluated through the development of prototypes of two operative applications used by the Italian Civil Protection for Wild Fires Risk Assessment (RISICO) and by the French Civil Protection for Flash Flood Risk Management (SPC-GD). The results of these studies and proof-of-concepts have been used as the basis for the definition of research and innovation strategies aiming to the detailed design and implementation of the infrastructure. In particular the main research themes and topics to be addressed have been identified and detailed. Finally the obstacles to the innovation required for the adoption of this infrastructure and possible strategies to overcome them have been discussed

    Exploring the Relationships between Privacy by Design Schemes and Privacy Laws: A Comparative Analysis

    Full text link
    Internet of Things (IoT) applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws. However, doing so can be a difficult and challenging task. Recent research has revealed that developers typically face difficulties when complying with regulations. One key reason is that, at times, regulations are vague, and could be challenging to extract and enact such legal requirements. In our research paper, we have conducted a systematic analysis of the data protection laws that are used across different continents, namely: (i) General Data Protection Regulations (GDPR), (ii) the Personal Information Protection and Electronic Documents Act (PIPEDA), (iii) the California Consumer Privacy Act (CCPA), (iv) Australian Privacy Principles (APPs), and (v) New Zealand's Privacy Act 1993. In this technical report, we presented the detailed results of the conducted framework analysis method to attain a comprehensive view of different data protection laws and highlighted the disparities, in order to assist developers in adhering to the regulations across different regions, along with creating a Combined Privacy Law Framework (CPLF). After that, we gave an overview of various Privacy by Design (PbD) schemes developed previously by different researchers. Then, the key principles and individuals' rights of the CPLF were mapped with the privacy principles, strategies, guidelines, and patterns of the Privacy by Design (PbD) schemes in order to investigate the gaps in existing schemes.Comment: Technical Repor

    Exploring the relationships between privacy by design schemes and privacy laws: a comparative analysis

    Get PDF
    Internet of Things (IoT) applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws. However, doing so can be a difficult and challenging task. Recent research has revealed that developers typically face difficulties when complying with regulations. One key reason is that, at times, regulations are vague, and could be challenging to extract and enact such legal requirements. In our research paper, we have conducted a systematic analysis of the data protection laws that are used across different continents, namely: (i) General Data Protection Regulations (GDPR), (ii) the Personal Information Protection and Electronic Documents Act (PIPEDA), (iii) the California Consumer Privacy Act (CCPA), (iv) Australian Privacy Principles (APPs), and (v) New Zealand’s Privacy Act 1993. In this technical report, we presented the detailed results of the conducted framework analysis method to attain a comprehensive view of different data protection laws and highlighted the disparities, in order to assist developers in adhering to the regulations across different regions, along with creating a Combined Privacy Law Framework (CPLF). After that, we gave an overview of various Privacy by Design (PbD) schemes developed previously by different researchers. Then, the key principles and individuals’ rights of the CPLF were mapped with the privacy principles, strategies, guidelines, and patterns of the Privacy by Design (PbD) schemes in order to investigate the gaps in existing schemes

    Interfirm Job Mobility of Two Cohorts of Young German Men 1979 - 1990: An analysis of the (West-)German Employment Statistic Register Sample concerning multivariate failure times and unobserved heterogeneity

    Get PDF
    The OECD (1993) has documented that the majority of workers in industrialised countries can look forward to finding a stable employment relationship. However new entrants into the labor force experience high turnover. Promoting institutions which support longer tenures and worker participation (or ''voice`` in the firm) utilize strategies to encourage enterprise and employee efforts in skill formation and training. The results of the OECD (1993) study show that attachments between employee and employer are more likely to endure for Japanese, French and German workers. Furthermore Germany has the highest share of young new recruits who received any formal training from their employer. In Germany, 71.5 % of young new recruits were trained at any job within 7 years after leaving school, whereas in the U.S. only 10.2 % of young new recruits were similarly trained (cf. OECD 1993, 137). It is sometimes assumed that employment protection policies have been exogenously imposed and thus probably impair efficiency. However, research on the micro-economics of labor markets has shown that employers may be interested in long-term employment relationships (cf. Levine 1991). Here, the job training model focusing on the importance of human capital investment, specifically the job shopping and matching model stressing the process of information gathering through employment experience should be mentioned. In such models employment protection legislation has not only desirable distributional effects but also help to ensure efficient outcomes. Therefore, it is important to assess the relevance of micro- economic theories empirically. This paper provides an empirical analysis of job durations in Western Germany using information from two cohorts of new entrants to the labor force documented in the (West-)German employment statistic register sample (cf. Bender and Hilzendegen 1996). The appropriate empirical technique to study job length is event history or survival analysis. In labor market research, survival analysis has primarily focused on explaining the length of unemployment spells. Application of this technique to employment is less common 1 , because huge longitudinal data sets are needed. Apart from testing hypotheses about the effect of personal characteristics and labor demand variables (e.g. firm size and industry affiliation), we will assess the influence of heterogeneity of the members of the two cohorts on their duration profile. The applied model and estimation method allow for unobserved heterogeneity and correlation between the clustered failure times of one employee as well as for right-censored spells. Our analysis is not restricted to the beginning of the working life of the employees. The individual retirement decision is affected by employment protection and early retirement regulations which differ widely between the firms. The respective data are missing in the employment statistic register, so that the retirement decision cannot be modelled explicitly

    Measuring the health effects of air pollution : to what extent can we really say people are dying from bad air?

    Get PDF
    Estimation of the effects of environmental impacts is a major focus of current theoretical and policy research in environmental economics. Such estimates are used to set regulatory standards for pollution exposure; design appropriate environmental protection and damage mitigation strategies; guide the assessment of environmental impacts; and measure public willingness to pay for environmental amenities. It is a truism that the effectiveness of such strategies depends crucially on the quality of the estimates used to inform them. However, this paper argues that in respect to at least one area of the empirical literature - the estimation of the health impacts of air pollution using daily time series data - existing estimates are questionable and thus have limited relevance for environmental decision-making. By neglecting the issue of model uncertainty - or which models, among the myriad of possible models researchers should choose from to estimate health effects - most studies overstate confidence in their chosen model and underestimate the evidence from other models, thereby greatly enhancing the risk of obtaining uncertain and inaccurate results. This paper discusses the importance of model uncertainty for accurate estimation of the health effects of air pollution and demonstrates its implications in an exercise that models pollution-mortality impacts using a new and comprehensive data set for Toronto, Canada. The main empirical finding of the paper is that standard deviations for air pollution-mortality impacts become very large when model uncertainty is incorporated into the analysis. Indeed they become so large as to question the plausibility of previously measured links between air pollution and mortality. Although applied to the estimation of the effects of air pollution, the general message of this paper - that proper treatment of model uncertainty critically determines the accuracy of the resulting estimates - applies to many studies that seek to estimate environmental effects
    • …
    corecore