12,692 research outputs found

    Scale-free law: network science and copyright

    Get PDF
    No description supplie

    Risk media and the end of anonymity

    Get PDF
    Whereas threats from twentieth century 'broadcast era' media were characterised in terms of ideology and ‘effects', today the greatest risks posed by media are informational. This paper argues that digital participation as the condition for the maintenance of today's self identity and basic sociality has shaped a new principal media risk of the loss of anonymity. I identify three interrelated key features of this new risk. Firstly, basic communicational acts are archival. Secondly, there is a diminishment of the predictable 'decay time' of media. And, thirdly, both of these shape a new individual and organizational vulnerability of 'emergence' – the haunting by our digital trails. This article places these media risks in the context of the shifting nature and function of memory and the potential uses and abuses of digital pasts

    National Security in the Information Age

    Get PDF
    The information environment has been changing right along with the broader security environment. Today, the information environment connects almost everyone, almost everywhere, almost instantaneously. The media environment has become global, and there’s no longer such thing as “the news cycle” —everything is 24/7. Barriers between US and global publics have virtual disappeared: Everything and anything can “go viral” instantly, and it’s no longer possible to say one thing to a US audience and another thing to a foreign audience and assume no one will ever set the statements side by side. The Pakistani military has a very clear idea of what the Secretary of Defense tells Congress about Pakistan, for instance—and Congress has an equally clear idea of how Pakistani leaders talk about the United States to their domestic constituencies. Technological changes and lower costs have also democratized the media and information environment: Internet and cell phone access is increasingly ubiquitous, and individuals and organizations are ever more reliant on electronic communication. Today, news, commentary, and video can be produced and accessed equally by first world media producers, Washington decision-makers, Iowa housewives, Afghan shepherds, Chinese university students, Colombian insurgents, and Al Qaeda members. As with the security environment more broadly, the rapidly changing information environment creates both new challenges and new opportunities for the US government. The author emphasizes that this is true across the executive branch. All USG agencies, from Defense to State to Treasury and beyond, are struggling to adapt anachronistic programs and policies

    Security and Privacy Issues in Cloud Computing

    Full text link
    Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew ex-ponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment

    Netcitizenship: addressing cyberevenge and sexbullying

    Get PDF
    This article discusses the phenomena of Cyberevenge, sexbullying, and sextortion, especially among young people. The discussion, based on extensive review of books, research reports, newspapers, journal articles and pertinent websites, analyzes these challenges. The article suggests some remedies to counter these online social ills which pertain to promoting responsibility of netcitizens, schools, governments, Non-Governmental Organizations (NGOs) and social networking sites

    A Gift of Life Deserves Compensation: How to Increase Living Kidney Donation with Realistic Incentives

    Get PDF
    Treatment for end-stage renal (kidney) disease (ESRD) is the only government-funded health care in the United States that has no financial need- or age-based criteria; inclusion in the program (Medicare) is solely based on diagnosis. If a person has ESRD, treatment is covered by Medicare. No other criteria must be met, but the best treatment option, a transplant, is not available for most patients. Compared with dialysis, a kidney transplant significantly prolongs life and improves quality of life, but kidneys are scarce in large part because federal law prohibits the buying and selling of organs. The average waiting time for a kidney transplant in the United States approaches 5 years; in some parts of the country, it is closer to 10 years. A significant number of transplant candidates die while waiting for an altruistic donation that never comes. Allowing the sale of kidneys from living donors would greatly increase the supply of kidneys and thereby save lives and minimize the number of patients suffering on dialysis. The National Organ Transplant Act of 1984 was passed to, among other things, prohibit the sale of organs in the face of apprehension that the growing commercialization of medicine would result in human beings being treated as commodities rather than individuals. Whether such concerns were well founded or not, the act was clearly overbroad in its prohibition of the sale of organs. It's time to loosen those restrictions in order to save lives. The best way to increase the supply of kidneys without drastically changing the existing allocation system is to legalize a regulated system of compensation for living kidney donors. Such a system could be established using the infrastructure already in place for evaluating deceased donors and allocating their organs. The only change required to ease and probably even solve the organ shortage is some form of payment for donors. The potential practical and theoretical concerns with compensated donation can be overcome, and alternative proposals will not do enough to solve the shortage. Upon careful analysis, it is clear that the benefits of a regulated system of compensated donation (chiefly, increasing the number of donated kidneys) outweigh any risks

    $=€=Bitcoin?

    Get PDF
    Bitcoin (and other virtual currencies) have the potential to revolutionize the way that payments are processed, but only if they become ubiquitous. This Article argues that if virtual currencies are used at that scale, it would pose threats to the stability of the financial system—threats that have been largely unexplored to date. Such threats will arise because the ability of a virtual currency to function as money is very fragile—Bitcoin can remain money only for so long as people have confidence that bitcoins will be readily accepted by others as a means of payment. Unlike the U.S. dollar, which is backed by both a national government and a central bank, and the euro, which is at least backed by a central bank, there is no institution that can shore up confidence in Bitcoin (or any other virtual currency) in the event of a panic. This Article explores some regulatory measures that could help address the systemic risks posed by virtual currencies, but argues that the best way to contain those risks is for regulated institutions to out-compete virtual currencies by offering better payment services, thus consigning virtual currencies to a niche role in the economy. This Article therefore concludes by exploring how the distributed ledger technology pioneered by Bitcoin could be adapted to allow regulated entities to provide vastly more efficient payment services for sovereign currency-denominated transactions, while at the same time seeking to avoid concentrating the provision of those payment services within “too big to fail” banks

    Misinformation making a disease outbreak worse: Outcomes compared for influenza, monkeypox and norovirus

    Get PDF
    Health misinformation can exacerbate infectious disease outbreaks. Especially pernicious advice could be classified as “fake news”: manufactured with no respect for accuracy and often integrated with emotive or conspiracy-framed narratives. We built an agent-based model that simulated separate but linked circulating contagious disease and sharing of health advice (classified as useful or harmful). Such advice has potential to influence human risk-taking behavior and therefore the risk of acquiring infection, especially as people are more likely in observed social networks to share bad advice. We test strategies proposed in the recent literature for countering misinformation. Reducing harmful advice from 50% to 40% of circulating information, or making at least 20% of the population unable to share or believe harmful advice, mitigated the influence of bad advice in the disease outbreak outcomes. How feasible it is to try to make people “immune” to misinformation or control spread of harmful advice should be explored
    corecore