108 research outputs found

    Perspectives on Digital Humanism

    Get PDF
    This open access book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by selected thinkers from a variety of disciplines, including computer science, philosophy, education, law, economics, history, anthropology, political science, and sociology. This initiative emerged from the Vienna Manifesto on Digital Humanism and the associated lecture series. Digital Humanism deals with the complex relationships between people and machines in digital times. It acknowledges the potential of information technology. At the same time, it points to societal threats such as privacy violations and ethical concerns around artificial intelligence, automation and loss of jobs, ongoing monopolization on the Web, and sovereignty. Digital Humanism aims to address these topics with a sense of urgency but with a constructive mindset. The book argues for a Digital Humanism that analyses and, most importantly, influences the complex interplay of technology and humankind toward a better society and life while fully respecting universal human rights. It is a call to shaping technologies in accordance with human values and needs

    Security in Internet of Things: networked smart objects.

    Get PDF
    Internet of Things (IoT) is an innovative paradigm approaching both industries and humans every-day life. It refers to the networked interconnection of every-day objects, which are equipped with ubiquitous intelligence. It not only aims at increasing the ubiquity of the Internet, but also at leading towards a highly distributed network of devices communicating with human beings as well as with other devices. Thanks to rapid advances in underlying technologies, IoT is opening valuable opportunities for a large number of novel applications, that promise to improve the quality of humans lives, facilitating the exchange of services. In this scenario, security represents a crucial aspect to be addressed, due to the high level of heterogeneity of the involved devices and to the sensibility of the managed information. Moreover, a system architecture should be established, before the IoT is fully operable in an efficient, scalable and interoperable manner. The main goal of this PhD thesis concerns the design and the implementation of a secure and distributed middleware platform tailored to IoT application domains. The effectiveness of the proposed solution is evaluated by means of a prototype and real case studies

    Perspectives on Digital Humanism

    Get PDF
    This open access book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by selected thinkers from a variety of disciplines, including computer science, philosophy, education, law, economics, history, anthropology, political science, and sociology. This initiative emerged from the Vienna Manifesto on Digital Humanism and the associated lecture series. Digital Humanism deals with the complex relationships between people and machines in digital times. It acknowledges the potential of information technology. At the same time, it points to societal threats such as privacy violations and ethical concerns around artificial intelligence, automation and loss of jobs, ongoing monopolization on the Web, and sovereignty. Digital Humanism aims to address these topics with a sense of urgency but with a constructive mindset. The book argues for a Digital Humanism that analyses and, most importantly, influences the complex interplay of technology and humankind toward a better society and life while fully respecting universal human rights. It is a call to shaping technologies in accordance with human values and needs

    Quantum key distribution and cryptography: a survey

    Get PDF
    I will try to partially answer, based on a review on recent work, the following question: Can QKD and more generally quantum information be useful to cover some practical security requirements in current (and future) IT infrastructures ? I will in particular cover the following topics - practical performances of QKD - QKD network deployment - SECOQC project - Capabilities of QKD as a cryptographic primitive - comparative advantage with other solution, in order to cover practical security requirements - Quantum information and Side-channels - QKD security assurance - Thoughts about "real" Post-Quantum Cryptograph

    Designing a sensor device for agricultural environment

    Get PDF
    Dissertação de Mestrado em Design, com a especialização em Design de Produto apresentada na Faculdade de Arquitetura da Universidade de Lisboa para obtenção do grau de Mestre.N/

    The Retention and Processing of Communications Data for Law Enforcement: A Challenge for Privacy

    Get PDF
    Law enforcement agencies are dominant end users of information communication technologies. These technologies are not necessarily created for pursuing criminal justice objectives. They are mechanisms that are built, administered, and maintained by private actors for their own purposes and later incorporated into law enforcement processes. They serve an effective role in the investigation, detection, and prosecution of crime, particularly through their collection and processing of relevant data. For the purposes of this thesis, the data at issue concerns the who, where, when, and how of a communication. Broadly classed as 'communications data' this information is readily and consistently available due to technological developments which result in blanket collection and retention, enable easier access, and create opportunities to derive greater meaning from the information through data analysis. The thesis examines the challenges of reconciling privacy with the use of this data in policing by conducting a critical analysis of 'how, and to what extent, do the current legal and policy frameworks governing the retention of, access to, and analysis of communications data by law enforcement, constitute a violation of privacy which requires substantive changes to the legal regime?'. Employing the approach of Thomas P. Hughes for examining socio-technical systems, the thesis argues that technology and privacy are co-constructed. This is evidenced though the evolution of the technology and the relevant legal and policy factors which contributed to the information communication system's development and acceptance as a policing tool. Three key areas, namely data retention, access to data, and data analysis are used to explore how communications data intersects with law enforcement objectives. Each element of the system is critiqued to assess significant changes in actors and roles, information types, and transmission principles. Utilising Helen Nissenbaum's theory of contextual integrity, it is argued that changes in each of the three key areas represent a prima facie violation of informational norms. Where a violation of these norms is identified, it is then evaluated against the perceived benefits of the technology to determine the impact on privacy. The impact on privacy is weighed against the existing legal safeguards in the investigatory powers mechanisms. Examining the privacy interest in a contextual manner allows for the specifics of the technology system to be incorporated into the assessment of the privacy violations. The thesis concludes that it is insufficient to apply traditional interpretations of privacy to technologies which have fundamentally altered social expectations through the scale/scope of data, the deconstruction of traditional boundaries, the limitation of ephemerality, and changes in technologically mediated presence. Applying a legal framework which does not acknowledge this impact fails to guarantee fundamental privacy rights. A number of recommendations are advanced for reform of the investigatory powers mechanisms to ensure privacy is protected when communications data is utilised by law enforcement

    New forms of collaborative innovation and production on the internet

    Get PDF
    The Internet has enabled new forms of large-scale collaboration. Voluntary contributions by large numbers of users and co-producers lead to new forms of production and innovation, as seen in Wikipedia, open source software development, in social networks or on user-generated content platforms as well as in many firm-driven Web 2.0 services. Large-scale collaboration on the Internet is an intriguing phenomenon for scholarly debate because it challenges well established insights into the governance of economic action, the sources of innovation, the possibilities of collective action and the social, legal and technical preconditions for successful collaboration. Although contributions to the debate from various disciplines and fine-grained empirical studies already exist, there still is a lack of an interdisciplinary approach

    New forms of collaborative innovation and production on the internet : an interdisciplinary perspective

    Get PDF
    Contents Introduction 1 New forms of collaborative innovation and production on the Internet : Volker Wittke and Heidemarie Hanekop Interdisciplinary perspectives on collaborative innovation and production: Conceptual debates 2 Customer Co-Creation: Open Innovation with Customers : Frank Piller, Christoph Ihl and Alexander Vossen 3 Governing Social Production : Niva Elkin-Koren 4 Trust Management in Online Communities : Audun Jøsang 5 Building a reputation system for Wikipedia : Christian Damsgaard Jensen 6 Cooperation in Wikipedia from a Network Perspective : Christian Stegbauer Firm driven collaborative innovation and production: Case studies 7 Managing a New Consumer Culture: “Working Consumers” in Web 2.0 as a Source of Corporate Feedback : Sabine Hornung, Frank Kleemann and G. Günter Voß 8 Prosuming, or when customers turn collaborators: coordination and motivation of customer contribution : Birgit Blättel-Mink, Raphael Menez, Dirk Dalichau, Daniel Kahnert 9 Role Confusion in Open Innovation Intermediary Arenas : Tobias Fredberg, Maria Elmquist, Susanne Ollila, Anna Yström List of Contributor
    • …
    corecore