5,825 research outputs found

    I Commerce: Tocqueville, the Internet, and the Legalized Self

    Get PDF

    Compelled to control: conflicting visions of the future of cyberspace

    Get PDF
    This report looks at the desire among states for greater control over the digital domain. It considers the convergence of controlling desires among the major cyberpowers and examines some of the main dynamics of the Russian and Chinese positions. Their positions are examined relative to each other and to the Western consensus. The paper analyses the potential implications for the global internet and the impact that developing countries may have on the dialogue

    Trust in the Digital World The Return of the Kings of Old

    Get PDF
    Drawing principally on examples and literature from the Anglosphere, the author argues that the high salience given to "trust" and "trustworthiness" in recent scholarly literature, and which (notably in Putnam's work) attributes declining trust to a widely mistrusted mass media does not acknowledge the trustbuilding potential (realised in some instances) of interactive "Web 2.0" applications. Drawing on O'Neill's proposal that trust inheres in dialogue and mutual checking and verification, the author argues that "Web 2.0" media provide a variety of instances where the "dialogic" character of "Web 2.0" has established and enhanced trustworthiness. He argues normatively for a combination of "Web 2.0" interactivity and the adoption and implementation of selfregulatory codes in order to enhance the trustworthiness of the media.trust, mass media, Web 2.0, self-regulation, trustworthiness.

    Online Dispute Resolution Through the Lens of Bargaining and Negotiation Theory: Toward an Integrated Model

    Get PDF
    [Excerpt] In this article we apply negotiation and bargaining theory to the analysis of online dispute resolution. Our principal objective is to develop testable hypotheses based on negotiation theory that can be used in ODR research. We have not conducted the research necessary to test the hypotheses we develop; however, in a later section of the article we suggest a possible methodology for doing so. There is a vast literature on negotiation and bargaining theory. For the purposes of this article, we realized at the outset that we could only use a small part of that literature in developing a model that might be suitable for empirical testing. We decided to use the behavioral theory of negotiation developed by Richard Walton and Robert McKersie, which was initially formulated in the 1960s. This theory has stood the test of time. Initially developed to explain union-management negotiations, it has proven useful in analyzing a wide variety of disputes and conflict situations. In constructing their theory, Walton and McKersie built on the contributions and work of many previous bargaining theorists including economists, sociologists, game theorists, and industrial relations scholars. In this article, we have incorporated a consideration of the foundations on which their theory was based. In the concluding section of the article we discuss briefly how other negotiation and bargaining theories might be applied to the analysis of ODR

    Book review: The internet in everything: freedom and security in a world with no off switch by Laura Denardis

    Get PDF
    In The Internet in Everything: Freedom and Security in a World with No Off Switch, Laura DeNardis offers an exploration of the invisible, complex and concerning worldwide network of technologies often referred to as the Internet of Things, focusing particularly on the pressing issues of governance and jurisdiction. Courteney J. O’Connor highly recommends this well researched and impeccably written text to political scientists, security practitioners and scholars as well as the interested public

    Cybersecurity and Cyber Defence: Nationwide Level Strategic Method

    Get PDF
    Data working knowledge OT and an extensive range of other practices tools and concepts are all comprised under the canopy term of cybersecurity The aggressive use of info skill to bout opponents is a characteristic eye of cyberse-curity Clienteles and security doctors are misinformed and the significant changes between these sentences are hidden by the use of the term cybersecurity as a key challenge and a substitute for info security or IT security The period cybersecurity should only be used to mention to security practices related to self-justifying actions involving or relying on info skill and or working knowledge surroundings and schemes according to the orientation of security leaders In this paper we define cyberse-curity and thoughtful how info securit

    Understanding Malicious Attacks Against Infrastructures - Overview on the Assessment and Management of Threats and Attacks to Industrial Control Systems

    Get PDF
    This report describes approaches to the assessment and management of malicious threats and attacks relating to critical infrastructures in general, and electric power infrastructures in particular. Securing infrastructures implies taking into account both the natural and man-made (intentional) events. While protecting against the natural disruptive events is a feasible (yet not trivial) task, benefiting by well-established practices, dealing with intentional attacks comes up across many difficulties, especially due to the unpredictability of such events. The report outlines the state-of-the-art in dealing with threats and malicious attacks, considering both physical and cyber actions. Several approaches taken at national and international levels towards securing the critical infrastructures are also provided.JRC.G.6-Sensors, radar technologies and cybersecurit
    • …
    corecore