62 research outputs found

    From data subjects to data suspects: challenging e-proctoring systems as a university practice

    Get PDF
    E-proctoring is a set of software and tools to monitor students’ behaviour during online examinations. Many universities have implemented this type of invigilation in response to the lockdowns during the pandemic to guarantee the validity and the integrity of exams. However, the intrusiveness of such technology into the students’ personal environment along with major accuracy problems (e.g., in authenticating black students) has attracted the scrutiny of various European data protection authorities and, more recently, equality bodies. In this paper, we critically approach the European normative framework available in countering the risks and situations of harms generated by e-proctoring through the lenses of data protection and anti-discrimination law. This work, in particular, is one of the first to systematise and analyse the corpus of online proctoring-related decisions that have emerged in the EU over the past three years. After an overview of the technical aspects of such technology and an outline of the legal issues debated in the literature, the paper will reconstruct and discuss the convergences and divergences in how courts and independent authorities have assessed the lawfulness of online invigilation tools. In our analysis, we observe that such instruments were evaluated differently depending on the concrete features implemented. However, with some notable exceptions, the General Data Protection Regulation and the anti-discrimination framework have largely proven helpful to combat the most intrusive forms of e-proctoring deployment or to mitigate their risks. Nevertheless, to ensure a safer and fairer educational environment, we conclude that a few crucial issues—including the effectiveness of the collective enforcement of rights, discriminatory effects for people not covered by a protected ground, and the governance of edTech within the university—should be further taken into account

    From data subjects to data suspects: challenging e-proctoring systems as a university practice

    Get PDF
    E-proctoring is a set of software and tools to monitor students’ behaviour during online examinations. Many universities have implemented this type of invigilation in response to the lockdowns during the pandemic to guarantee the validity and the integrity of exams. However, the intrusiveness of such technology into the students’ personal environment along with major accuracy problems (e.g., in authenticating black students) has attracted the scrutiny of various European data protection authorities and, more recently, equality bodies. In this paper, we critically approach the European normative framework available in countering the risks and situations of harms generated by e-proctoring through the lenses of data protection and anti-discrimination law. This work, in particular, is one of the first to systematise and analyse the corpus of online proctoring-related decisions that have emerged in the EU over the past three years. After an overview of the technical aspects of such technology and an outline of the legal issues debated in the literature, the paper will reconstruct and discuss the convergences and divergences in how courts and independent authorities have assessed the lawfulness of online invigilation tools. In our analysis, we observe that such instruments were evaluated differently depending on the concrete features implemented. However, with some notable exceptions, the General Data Protection Regulation and the anti-discrimination framework have largely proven helpful to combat the most intrusive forms of e-proctoring deployment or to mitigate their risks. Nevertheless, to ensure a safer and fairer educational environment, we conclude that a few crucial issues—including the effectiveness of the collective enforcement of rights, discriminatory effects for people not covered by a protected ground, and the governance of edTech within the university—should be further taken into account

    On the Security and Privacy of Implantable Medical Devices

    Get PDF

    On the Security and Privacy of Implantable Medical Devices

    Get PDF

    Living in the Margins of the State

    Get PDF
    This thesis explores the various forms of state manifestation in the lives of the Uzbek population living in the borderlands of Kyrgyzstan. With a particular focus on the stateless persons amongst this group, the thesis examines how the state materialises, manifests and transcends the lives of Uzbeks living in the physical, social and legal margins of the state. Based on fieldwork conducted along the militarized Kyrgyz-Uzbek border from 2013–2014, the ethnography presented in this work illuminates how people are experiencing, interacting and dealing with such manifestations of the state as borders, document practices and citizenship regime. This work addresses the scarcity of literature on statelessness in Central Asia and on rural Uzbek communities in Kyrgyzstan expanding the knowledge and understanding of the lived realities of this community by exploring how their worlds have been both shattered and coalesced through various political projects that temporarily both inhibits and facilities the existence of their cross-border social worlds. This thesis explores how the state is shaping the lives of the people who have become entangled with the increased presence of the state in the form of physical border barriers, state documentation practices and the prevalent citizenship regime. It particularly looks at the physical manifestation of the state boundaries, namely the borders and their morphology, illustrating how the physical presence of the borders have created new ways of socialising for a community whose lives transcend and spill over the state boundaries. By illuminating how the particular morphology of the border shapes and directs sociality, this work calls for more attention to the materiality of borders in the anthropological literature. Furthermore, this thesis advances the anthropological understanding of the state’s manifestation process itself by illustrating it’s fluctuating presence. The thesis shows how through scrutinising people’s engagement with documents, the temporal dynamic of state’s spatialising practices become visible. Finally, this thesis illustrates how the most prominent material artefact denoting the citizenship status, the passport, is central to the way people narrate their experiences of statelessness and to their understandings of citizenship status as such. This work advances the study of statelessness by focusing on the statelessness experiences and understandings of this status, rather than its legal dimensions, and argues for the incorporation of a spatial dimension and documentation aspects in exploring how people situate their lives in spaces where the nation-state is not always the main point of reference. Attending to such material state manifestations as borders and documents, this thesis highlights how locating the state in its concrete expressions in everyday lives enables us to explore the ways the state becomes present and transcends the lives of people, and how people on their own behalf engage with these state manifestations.Doktorgradsavhandlin

    Game Theory for Multi-Access Edge Computing:Survey, Use Cases, and Future Trends

    Get PDF
    Game theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming multiaccess edge computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as quality of experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game's usefulness, namely, rational versus evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game's model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse tradeoffs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios
    • 

    corecore