11,825 research outputs found
Algorithmic Jim Crow
This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on the back end in the form of designing, interpreting, and acting upon vetting and screening systems in ways that result in a disparate impact
Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications
The unprecedented proliferation of smart devices together with novel
communication, computing, and control technologies have paved the way for the
Advanced Internet of Things~(A-IoT). This development involves new categories
of capable devices, such as high-end wearables, smart vehicles, and consumer
drones aiming to enable efficient and collaborative utilization within the
Smart City paradigm. While massive deployments of these objects may enrich
people's lives, unauthorized access to the said equipment is potentially
dangerous. Hence, highly-secure human authentication mechanisms have to be
designed. At the same time, human beings desire comfortable interaction with
their owned devices on a daily basis, thus demanding the authentication
procedures to be seamless and user-friendly, mindful of the contemporary urban
dynamics. In response to these unique challenges, this work advocates for the
adoption of multi-factor authentication for A-IoT, such that multiple
heterogeneous methods - both well-established and emerging - are combined
intelligently to grant or deny access reliably. We thus discuss the pros and
cons of various solutions as well as introduce tools to combine the
authentication factors, with an emphasis on challenging Smart City
environments. We finally outline the open questions to shape future research
efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for
publication in IEEE Network, 2019. Copyright may be transferred without
notice, after which this version may no longer be accessibl
Recommended from our members
Immigration: Visa Security Policies
[Excerpt] The report opens with an overview of visa issuance policy. It then explains the key provisions that guide the documentary requirements and approval/disapproval process. The section on consular screening procedures includes an analysis of trends over time in denying visas. Visa revocation, a reoccurring issue of concern to Congress, and the visa security program are discussed as well
Watching You: Systematic Federal Surveillance of Ordinary Americans
To combat terrorism, Attorney General John Ashcroft has asked Congress to "enhance" the government's ability to conduct domestic surveillance of citizens. The Justice Department's legislative proposals would give federal law enforcement agents new access to personal information contained in business and school records. Before acting on those legislative proposals, lawmakers should pause to consider the extent to which the lives of ordinary Americans already are monitored by the federal government. Over the years, the federal government has instituted a variety of data collection programs that compel the production, retention, and dissemination of personal information about every American citizen. Linked through an individual's Social Security number, these labor, medical, education and financial databases now empower the federal government to obtain a detailed portrait of any person: the checks he writes, the types of causes he supports, and what he says "privately" to his doctor. Despite widespread public concern about preserving privacy, these data collection systems have been enacted in the name of "reducing fraud" and "promoting efficiency" in various government programs. Having exposed most areas of American life to ongoing government scrutiny and recording, Congress is now poised to expand and universalize federal tracking of citizen life. The inevitable consequence of such constant surveillance, however, is metastasizing government control over society. If that happens, our government will have perverted its most fundamental mission and destroyed the privacy and liberty that it was supposed to protect
THE DANGERS OF FIGHTING TERRORISM WITH TECHNOCOMMUNITARIANISM: CONSTITUTIONAL PROTECTIONS OF FREE EXPRESSION, EXPLORATION, AND UNMONITORED ACTIVITY IN URBAN SPACES
Part I of this article examines how some commentators can plausibly argue that constitutional liberty and privacy protections do not protect the individual liberty and privacy that modern individuals have come to expect in many public spaces, particularly in urban environments. Constitutional liberalism, this section points out, makes this question a difficult one, because it is marked by scrupulous neutrality towards different visions of “the good life.” In other words, the constitutional order does not condemn those who choose a communitarian way of life and favor those who prefer individualism. Rather, it tolerates both of these (and other) preferences about one’s social and cultural environment, and leaves citizens free to opt for the life of their choice. Part II suggests that it is difficult to make sense of our modern jurisprudence of First Amendment rights, especially as they relate to anonymous communication and association on the Internet and elsewhere, unless one allows room in our constitutional law for a jurisprudence that “captures” and preserves social incarnations of liberty and privacy that were not yet in existence when theConstitution was drafted. Therefore, it is possible for for courts and others to find that freedom-enabling institutions that did not exist earlier in American history, and might cease to exist in the future, deserve certain constitutional protection while they are here. Part III explains that like the virtual liberation offered by the Internet, city life offered and continues to offer an invaluable refuge for substantial expressive activity and intellectual exploration that would be far more elusive without this type of urban existence. It provides individuals with an incredibly rich bazaar of ideas, and allows them to browse among these deas, substantially free from outside monitoring or control. While First Amendment law does not single out urban environments for protection, it protects such environments indirectly by preserving certain opportunities that are characteristic of modern urban life: opportunities for giving speeches to large crowds, for confronting strangers with ideas they may find unfamiliar or provocative, or for speaking or gathering information in the anonymity of the crowd
Responding to Cross Border Child Trafficking in South Asia: An Analysis of the Feasibility of a Technologically Enabled Missing Child Alert System
This report examines the feasibility of a technologically enabled system to help respond to the phenomenon of cross-border child trafficking in South Asia, and makes recommendations on how to proceed with a pilot project in the selected areas of Bangladesh, Nepal and India. The study was commissioned by the Missing Child Alert (MCA) programme which is an initiative led by Plan. MCA is an initiative to address cross-border child trafficking in South Asia, led by Plan. The aim of the programme is to link existing institutions, mechanisms and resources in order to tackle the phenomenon from a regional perspective. To achieve this, Plan propose to implement a technologically equipped, institutionalised system of alert that can assist in the rescue, rehabilitation, repatriation and reintegration of children who are at risk of, or are victims of, cross-border trafficking
Linking recorded data with emotive and adaptive computing in an eHealth environment
Telecare, and particularly lifestyle monitoring, currently relies on the ability to detect and respond to changes in individual behaviour using data derived from sensors around the home. This means that a significant aspect of behaviour, that of an individuals emotional state, is not accounted for in reaching a conclusion as to the form of response required. The linked concepts of emotive and adaptive computing offer an opportunity to include information about emotional state and the paper considers how current developments in this area have the potential to be integrated within telecare and other areas of eHealth. In doing so, it looks at the development of and current state of the art of both emotive and adaptive computing, including its conceptual background, and places them into an overall eHealth context for application and development
Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland
The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States. The analysis of institutional system - providing legal security of communication and information institutions, companies and citizens against the dangers arising from the ongoing development of innovative new technologies in the European Union and Poland. This article is an attempt to analyze the possibility of using security systems and Biometry CTTV in Poland in terms of legislation. The results of the analysis indicate that, in terms of institutions Poland did not do badly in relation to the risks arising from the implementation of technology. The situation is not as good when it comes to the awareness of citizens and small businesses. This requires that facilitate greater access to free security software companies from data leakage or uncontrolled cyber-terrorist attacks. With regard to the use of security systems, CCTV and biometrics, Poland in legal terms is still early in the process of adapting to EU Directive. The continuous development of technology should force the legislature to establish clear standards and regulations for the application of CCTV technology and biometrics, as it is of great importance in ensuring the fundamental rights and freedoms of every citizen of the Polish Republic.Wyniki analizy wskazują, że pod względem instytucji Polska nie wypada źle w odniesieniu do zagrożeń wynikających z wdrożenia technologii. Sytuacja nie jest tak dobra, jeśli chodzi o świadomość obywateli i mniejszych firm. Wymaga to ułatwiania szerszego dostępu do darmowych programów zabezpieczających firmy przed wyciekiem danych lub niekontrolowanych cyber-ataków terrorystycznych. W odniesieniu do stosowania systemów zabezpieczeń CCTV oraz biometrii, Polska pod względem prawnym jest wciąż na początku procesu dostosowania do dyrektywy UE. Ciągły rozwój technologii powinien zmusić ustawodawcę do stworzenia jednoznacznych standardów i przepisów obowiązujących w zakresie stosowania technologii CCTV oraz biometrii, gdyż ma to ogromne znaczenie w zapewnieniu podstawowych praw i wolności każdego obywatela Rzeczypospolitej Polskiej
Challenges and opportunities of context-aware information access
Ubiquitous computing environments embedding a wide range of pervasive computing technologies provide a challenging and exciting new domain for information access. Individuals working in these environments are increasingly permanently connected to rich information resources. An appealing opportunity of these environments is the potential to deliver useful information to individuals either from their previous information experiences or external sources. This information should enrich their life experiences or make them more effective in their endeavours. Information access in ubiquitous computing environments can be made "context-aware" by exploiting the wide range context data available describing the environment, the searcher and the information itself. Realizing such a vision of reliable, timely and appropriate identification and delivery of information in this way poses numerous challenges. A central theme in achieving context-aware information access is the combination of information retrieval with multiple dimensions of available context data. Potential context data sources, include the user's current task, inputs from environmental and biometric sensors, associated with the user's current context, previous contexts, and document context, which can be exploited using a variety of technologies to create new and exciting possibilities for information access
- …