1,710 research outputs found

    No Trespassing: A Lawmaker's Guide to Protecting Property Rights in the Age of Augmented and Mixed Reality

    Get PDF

    COSPO/CENDI Industry Day Conference

    Get PDF
    The conference's objective was to provide a forum where government information managers and industry information technology experts could have an open exchange and discuss their respective needs and compare them to the available, or soon to be available, solutions. Technical summaries and points of contact are provided for the following sessions: secure products, protocols, and encryption; information providers; electronic document management and publishing; information indexing, discovery, and retrieval (IIDR); automated language translators; IIDR - natural language capabilities; IIDR - advanced technologies; IIDR - distributed heterogeneous and large database support; and communications - speed, bandwidth, and wireless

    CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines

    Get PDF
    Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to multimedia content search from, a technical, and socio-economic perspective. The technical perspective includes an up to date view on content based indexing and retrieval technologies, multimedia search in the context of mobile devices and peer-to-peer networks, and an overview of current evaluation and benchmark inititiatives to measure the performance of multimedia search engines. From a socio-economic perspective we inventorize the impact and legal consequences of these technical advances and point out future directions of research

    Special Libraries, July-August 1959

    Get PDF
    Volume 50, Issue 6https://scholarworks.sjsu.edu/sla_sl_1959/1005/thumbnail.jp

    International Market Segmentation across Consumption and Communication Categories: Identity, Demographics, and Consumer Decisions and Online Habits

    Get PDF
    In this chapter we will discuss the different approaches to market segmentation and selection and explore how the selection process influences the company’s culture, its brand positioning, and how it is impacted upon by the overall marketing and communication strategy and vice versa. Some questions this chapter considers and discusses are: Which segments should firms’ international marketing activities (including financial, human resources, and the firm’s capabilities) focus on? How do multinationals decide if segmentation efforts are effective? Finally, we will explore how organizations1 can monitor and control the various activities and outcomes, in order to ensure sustainable competitive advantage(s) in a highly competitive marketplace and online marketspace

    Biometric Cyberintelligence and the Posse Comitatus Act

    Full text link
    This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems. This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult to enforce to protect against militarized cyberpolicing and cybersurveillance harms that may generate from the domestic use of military grade cybersurveillance tools. Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendment’s privacy jurisprudence, therefore, must be reinforced in the digital age to appropriately protect citizens from militarized cyberpolicing: the blending of military/foreign intelligence tools and operations, and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use

    E-government and Planning: Key Citizen Participation Issues and Applications

    Get PDF
    Citizen participation is a common goal of local governments. Local governments face the challenge of giving information to and getting input from citizens. The use of the Internet for citizen participation is growing among local government planning departments. This book explores the issues related to on-line citizen participation for local government planning departments. In designing for e-government planning departments need to consider accessibility, trust, and the types of participation tools that are most appropriate to meet citizen needs.The John Glenn Institute for Public Service and Public Polic

    Copyright in an Era of Information Overload: Toward the Privileging of Categorizers

    Get PDF
    Environmental laws are designed to reduce negative externalities (such as pollution) that harm the natural environment. Copyright law should adjust the rights of content creators in order to compensate for the ways they reduce the usefulness of the information environment as a whole. Every new work created contributes to the store of expression, but also makes it more difficult to find whatever work one wants. Such search costs have been well-documented in information economics. Copyright law should take information overload externalities like search costs into account in its treatment of alleged copyright infringers whose work merely attempts to index, organize, categorize, or review works by providing small samples of them. They are not free riding off the labor of copyright holders, but rather are creating the types of navigational tools and filters that help consumers make sense of the ocean of expression copyright holders have created. By modeling information overload as an externality imposed by copyrighted works, this article attempts to provide a new economic justification for more favorable legal treatment of categorizers, indexers, and reviewers. Information overload is an unintended negative consequence of copyright law\u27s success in incentivizing the production and distribution of expression. If courts grant content owners the right to veto categorizers\u27 efforts to make sense of given fields of expression, they will only exacerbate the problem. Designed to promote the progress of the arts and sciences, copyright doctrine should privilege the efforts of those who make that progress accessible and understandable. Categorizers fill both those vital roles

    Exposed

    Get PDF

    Biometric Cyberintelligence and the Posse Comitatus Act

    Get PDF
    This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems. This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult to enforce to protect against militarized cyberpolicing and cybersurveillance harms that may generate from the domestic use of military grade cybersurveillance tools. Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendment’s privacy jurisprudence, therefore, must be reinforced in the digital age to appropriately protect citizens from militarized cyberpolicing: the blending of military/foreign intelligence tools and operations, and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use
    corecore