11,901 research outputs found

    Challenges of keyword-based location disclosure

    Full text link
    A practical solution to location privacy should be incremen-tally deployable. We claim it should hence reconcile the eco-nomic value of location to aggregators, usually ignored by prior works, with a user’s control over her information. Loca-tion information indeed is being collected and used by many mobile services to improve revenues, and this gives rise to a heated debate: Privacy advocates ask for stricter regula-tion on information collection, while companies argue that it would jeopardize the thriving economy of the mobile web. We describe a system that gives users control over their information and does not degrade the data given to aggre-gators. Recognizing that the first challenge is to express lo-cations in a way that is meaningful for advertisers and users, we propose a keyword based design. Keywords characterize locations, let the users inform the system about their sen-sitivity to disclosure, and build information directly usable by an advertiser’s targeting campaign. Our work makes two main contributions: we design a market of location infor-mation based on keywords and we analyze its robustness to attacks using data from ad-networks, geo-located services, and cell networks. Categories and Subject Descriptors Security and Privacy [Human and societal aspects of security and privacy]: Usability in security and privac

    Conceptual search – ESI, litigation and the issue of language

    Get PDF
    Across the globe, legal, business and technical practitioners charged with managing information are continually challenged by rapid-fire evolution and growth in the legal and technology fields. In the United States, new compliance requirements, amendments to the Federal Rules of Civil Procedure (FRCP) and corresponding case law, along with technical advances, have made litigation support one of the most exciting professions in the legal arena. In the UK, revisions to the Practice Direction to CPR Rule 31 require parties in civil litigation to consider the impacts associated with electronic documents. One emerging technology trends—both aiding and complicating the management of electronically stored information (ESI) in litigation in the US, EU and UK alike—is the notion of “conceptual search.” This paper focuses on the evolution of conceptual search technology, and predictions of where this science will take legal professionals and technical information managers in coming years and a look at the advantages conceptual search can provide in dealing with the issue of language. This paper will focus primarily and the latent semantic analysis approach to conceptual search and why this approach is advantageous when searching ESI regardless of the language used in the documents, even to the extent of allowing for cross language searching and accurate searching of documents that contain co-mingle foreign terms with the native language

    State of The Art and Hot Aspects in Cloud Data Storage Security

    Get PDF
    Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area. In this paper, we examine the state of the art in cloud storage security through an overview of selected peer reviewed publications. We address the question of defining cloud storage security and its different aspects, as well as enumerate the main vec- tors of attack on cloud storage. The reviewed papers present techniques for key management and controlled disclosure of encrypted data in cloud storage, while novel ideas regarding secure operations on encrypted data and methods for pro- tection of data in fully virtualized environments provide a glimpse of the toolbox available for securing cloud storage. Finally, new challenges such as emergent government regulation call for solutions to problems that did not receive enough attention in earlier stages of cloud computing, such as for example geographical location of data. The methods presented in the papers selected for this review represent only a small fraction of the wide research effort within cloud storage security. Nevertheless, they serve as an indication of the diversity of problems that are being addressed

    Following the Money 2012: How the 50 States Rate in Providing Online Access to Government Spending Data

    Get PDF
    Assesses states' progress in offering comprehensive, one-stop access to searchable and downloadable databases of government spending via transparency 2.0 Web sites, including searchability, user-friendliness, breadth of data, and features such as mapping

    Towards improved performance and interoperability in distributed and physical union catalogues

    Get PDF
    Purpose of this paper: This paper details research undertaken to determine the key differences in the performance of certain centralised (physical) and distributed (virtual) bibliographic catalogue services, and to suggest strategies for improving interoperability and performance in, and between, physical and virtual models. Design/methodology/approach: Methodically defined searches of a centralised catalogue service and selected distributed catalogues were conducted using the Z39.50 information retrieval protocol, allowing search types to be semantically defined. The methodology also entailed the use of two workshops comprising systems librarians and cataloguers to inform suggested strategies for improving performance and interoperability within both environments. Findings: Technical interoperability was permitted easily between centralised and distributed models, however the various individual configurations permitted only limited semantic interoperability. Significant prescription in cataloguing and indexing guidelines, greater participation in the Program for Collaborative Cataloging (PCC), consideration of future 'FRBR' migration, and greater disclosure to end users are some of the suggested strategies to improve performance and semantic interoperability. Practical implications: This paper informs the LIS research community and union catalogue administrators, but also has numerous practical implications for those establishing distributed systems based on Z39.50 and SRW, as well as those establishing centralised systems. What is original/value of the paper?: The paper moves the discussion of Z39.50 based systems away from anecdotal evidence and provides recommendations based on testing and is intimately informed by the UK cataloguing and systems librarian community

    Assessing the data challenges of climate-related disclosures in European banks: a text mining study

    Get PDF
    El Grupo Intergubernamental de Expertos sobre el Cambio Climático (IPCC) estima que se debe alcanzar el objetivo de cero emisiones netas a escala global para el año 2050. A fin de conseguirlo, muchas empresas privadas se han comprometido a lograr las cero emisiones netas para 2050. El Comité Directivo de Datos Climáticos (CDSC) está trabajando en una iniciativa para crear un repositorio digital central global de divulgaciones climáticas que intente abordar los desafíos de datos actuales. Este documento evalúa el progreso de las instituciones financieras europeas en sus esfuerzos por superar los desafíos de datos descritos por el CDSC. Utilizando un enfoque de minería de textos, junto con la aplicación de modelos de lenguaje de gran tamaño (LLM) para la verificación de contexto, calculamos un Índice de Divulgación de Gases de Efecto Invernadero (GHGDI), analizando 23 divulgaciones muy específicas presentes en los informes ESG comprendidos entre 2019 y 2021 y pertenecientes a la mayoría de los bancos significativos bajo supervisión directa del BCE. Posteriormente se compara este índice con la puntuación otorgada por el Carbon Disclosure Project (CDP). Los resultados indican una correlación moderada entre aquellas instituciones que no informan al CDP cuando se les solicita y un bajo GHGDI. Las instituciones con una puntuación alta, por su parte, no guardan necesariamente correlación con un GHGDI alto.The Intergovernmental Panel on Climate Change (IPCC) estimates that global net-zero should be achieved by 2050. To this end, many private firms are pledging to reach net-zero emissions by 2050. The Climate Data Steering Committee (CDSC) is working on an initiative to create a global central digital repository of climate disclosures, which aims to address the current data challenges. This paper assesses the progress within European financial institutions towards overcoming the data challenges outlined by the CDSC. Using a text-mining approach, coupled with the application of commercial Large Language Models (LLM) for context verification, we calculate a Greenhouse Gas Disclosure Index (GHGDI), by analysing 23 highly granular disclosures in the ESG reports between 2019 and 2021 of most of the significant banks under the ECB’s direct supervision. This index is then compared with the CDP score. The results indicate a moderate correlation between institutions not reporting to CDP upon request and a low GHGDI. Institutions with a high CDP score do not necessarily correlate with a high GHGDI

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure

    Electronic Data, Electronic Searching, Inadvertent Production of Privileged Data: A Perfect Storm

    Get PDF
    This article suggests that the practical impact of treating electronic searching as an expert function is to permit attorneys to focus and strategize on the process of electronic searching rather than on the completeness of document production. In effect, electronic searching permits attorneys to quit focusing on finding documents and begin focusing on identifying electronic sources of information on which reside relevant documents that can be extracted by means of electronic searching protocols

    Discovery-led refinement in e-discovery investigations: sensemaking, cognitive ergonomics and system design.

    Get PDF
    Given the very large numbers of documents involved in e-discovery investigations, lawyers face a considerable challenge of collaborative sensemaking. We report findings from three workplace studies which looked at different aspects of how this challenge was met. From a sociotechnical perspective, the studies aimed to understand how investigators collectively and individually worked with information to support sensemaking and decision making. Here, we focus on discovery-led refinement; specifically, how engaging with the materials of the investigations led to discoveries that supported refinement of the problems and new strategies for addressing them. These refinements were essential for tractability. We begin with observations which show how new lines of enquiry were recursively embedded. We then analyse the conceptual structure of a line of enquiry and consider how reflecting this in e-discovery support systems might support scalability and group collaboration. We then focus on the individual activity of manual document review where refinement corresponded with the inductive identification of classes of irrelevant and relevant documents within a collection. Our observations point to the effects of priming on dealing with these efficiently and to issues of cognitive ergonomics at the human–computer interface. We use these observations to introduce visualisations that might enable reviewers to deal with such refinements more efficiently
    corecore