10,599 research outputs found

    Privacy as a Public Good

    Get PDF
    Privacy is commonly studied as a private good: my personal data is mine to protect and control, and yours is yours. This conception of privacy misses an important component of the policy problem. An individual who is careless with data exposes not only extensive information about herself, but about others as well. The negative externalities imposed on nonconsenting outsiders by such carelessness can be productively studied in terms of welfare economics. If all relevant individuals maximize private benefit, and expect all other relevant individuals to do the same, neoclassical economic theory predicts that society will achieve a suboptimal level of privacy. This prediction holds even if all individuals cherish privacy with the same intensity. As the theoretical literature would have it, the struggle for privacy is destined to become a tragedy. But according to the experimental public-goods literature, there is hope. Like in real life, people in experiments cooperate in groups at rates well above those predicted by neoclassical theory. Groups can be aided in their struggle to produce public goods by institutions, such as communication, framing, or sanction. With these institutions, communities can manage public goods without heavy-handed government intervention. Legal scholarship has not fully engaged this problem in these terms. In this Article, we explain why privacy has aspects of a public good, and we draw lessons from both the theoretical and the empirical literature on public goods to inform the policy discourse on privacy

    Hyperpresent avatars

    Get PDF
    This paper will discuss two student projects, which were developed during a hybrid course between art/design and computer sciences at Sabancı University; both of which involve the creation of two avatars whose visual attributes are determined by data feeds from ‘Real Life’ sources by following up from Biocca's concept of the Cyborg’s Dilemma, we will describe the creative and technological processes which went into the materialization of these two avatars

    The role of information systems in the prevention and detection of transnational and international crime

    Get PDF
    © Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a problem that cuts across national borders to exhibit a global dimension. The international dimension of criminal activity remains critical and is generally characterized by a complexity that is unique and requires action on many different levels. Criminals set out to mask their illegal activities and deliberately generate complexity as a means of concealment. In doing so, they exploit new developments in technology that assist them in achieving their ends. This criminality exhibits forms of innovation that stretch far beyond traditional criminal activity (e.g., drug and human trafficking) and manages to attach itself within the broader fabric of society by exploiting the very latest developments. This evolution is necessary as criminals seek not only to escape arrest, prosecution and conviction, but also to enjoy the fruits of their criminality (mostly financial gains). Thus, they seek to develop ways of exploiting the various diffuse norms of social interaction (e.g., trust), financial modes of conduct (e.g., cash-based economies), technological and communication developments (e.g., Internet), and thereby minimize the possibility for detection. By limiting the resources that can be made available for prevention (or making them obsolete when developing new criminal behaviour), they participate in this co-evolution actively; and this they achieve by generating complexity

    Epistemic authority and the gender lens

    Get PDF
    Researching 'hidden' forms of social inequality such as gender often poses particular challenges. Not least of these is how to uncover such dimensions of social life whilst preserving the perspectives of research participants, who may not consider such matters relevant to their lives, particularly if other forms of identity or oppression are more prominent for them. Here, I reflect on these issues in the context of researching user involvement in mental health services from a feminist perspective. I show how `uncovering' gender and other forms of social inequality in the field was aided through adopting a wide analytical lens focusing on power, along with reflexivity and openness in discussing my own political analysis and commitments in relation to the study area with the researched. I also describe how I attempted to resolve the epistemological-ethical issues involved through conceptualising these in terms of `situatedness' and gender salience and adopting a feminist standpoint which emphasised what researchers can, and indeed should, bring to the research enterprise. Related issues of power and empowerment in the research process are discussed

    ICS Materials. Towards a re-Interpretation of material qualities through interactive, connected, and smart materials.

    Get PDF
    The domain of materials for design is changing under the influence of an increased technological advancement, miniaturization and democratization. Materials are becoming connected, augmented, computational, interactive, active, responsive, and dynamic. These are ICS Materials, an acronym that stands for Interactive, Connected and Smart. While labs around the world are experimenting with these new materials, there is the need to reflect on their potentials and impact on design. This paper is a first step in this direction: to interpret and describe the qualities of ICS materials, considering their experiential pattern, their expressive sensorial dimension, and their aesthetic of interaction. Through case studies, we analyse and classify these emerging ICS Materials and identified common characteristics, and challenges, e.g. the ability to change over time or their programmability by the designers and users. On that basis, we argue there is the need to reframe and redesign existing models to describe ICS materials, making their qualities emerge

    Voter ID

    Get PDF
    The question of whether voters should be required to present an acceptable form of identification (ID) when casting a ballot at a federal election has persisted. Executive summary The question of whether voters should be required to present an acceptable form of identification (ID) when casting a ballot at a federal election has persisted, notwithstanding quite exhaustive debate and deliberation in numerous forums. Arguments advanced in favour of requiring voter ID included the need to: protect the integrity of the information contained on the roll deter attempts by voters to impersonate another voter discourage attempts by a voter to vote more than once. In 2001, in its report User friendly, not abuser friendly: Report of the inquiry into the integrity of the electoral roll, the Joint Standing Committee of Electoral Matters (JSCEM) concluded that that the introduction of voter identification was not warranted as a measure to deter fraud But while some consider that the level of alleged electoral fraud is minuscule, others have a much more pessimistic view. The report of the JSCEM Inquiry into the conduct of the 2001 Federal election addressed proof-of-identity requirements, but focussed on initial enrolment or re-enrolment, not the requirement to produce ID in the normal course of casting a ballot at a polling booth. The Committee recommended ‘that people making a first-time enrolment, those seeking re-enrolment, and those transferring their enrolment details, first be required to provide proof of identity and address, via a driver’s licence or similar. But evidence to that same JSCEM inquiry highlighted problems with the ready availability of ID among people who are extremely disadvantaged or living in Indigenous communities. Others argued that the alleged difficulties of producing ID are over stated, citing the numbers that attend large sports clubs or present ID to access video stores. Australians have a history of resistance to the adoption of any kind of universal ID card that can be legally required to be shown in order to access government services or to confirm one’s identity. The arguments against such a card are broadly couched in terms of personal privacy and an aversion to a ‘surveillance state’
    • …
    corecore