31,265 research outputs found

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    Policy and Legislative Frameworks for Co-management

    Get PDF
    This paper was prepared by Poseidon Aquatic Resource Management Ltd and the FAO Development Law Service (LEGN) for the Asia-Pacific Fisheries Commission workshop on Mainstreaming Fisheries Co-management in Asia-Pacific, which was held in Siem Reap, Cambodia, from 9 to 12 August 2005. The paper examines the policy and legislative frameworks for co-management in thirteen countries in Asia and the Pacific, and the extent to which these frameworks hinder or support co-management practices. Through an analysis of the different case studies, 'lessons learned' are presented and a number of conclusions are drawn about the key characteristics of a supportive policy and legislative framework based on some ideas about 'best practice'. The adoption of these characteristics by governments would demonstrate their commitment to co-management and increase the likelihood of co-management success

    A Modern Union for the Modern Economy

    Get PDF
    Membership in traditional unions has steeply declined over the past two decades. As the White House and Congress are now completely Republican controlled, there promises to be no reversal of this trend in the near future. In the face of this rejection of traditional bargaining efforts, several attempts have been made to create alternative “quasi-union” or “alt-labor” relationships between workers and employers. These arrangements represent a creative approach by workers to have their voices heard in a collective manner, though still falling far short of the traditional protections afforded by employment and labor law statutes. This Article critiques one such high-profile, quasi-union effort in the technology sector—the Uber Guild. While the Guild does not provide any of the traditional bargaining protections found in the National Labor Relations Act (NLRA), it offers Uber drivers some input over the terms and conditions under which they work. Falling somewhere between employment-at-will and unionization protected under the NLRA, the Uber Guild is a creative attempt to help both workers and the company to better understand how they can improve the working relationship. This Article navigates the Uber Guild and other nontraditional efforts that promise a collective voice for workers in the face of a precipitous decline in union membership. This Article further explores how workers in the technology sector face unique challenges under workplace laws. We argue that these workers are particularly well situated to benefit from a nontraditional union model and explain what that model should look like. While a traditional union protected by the NLRA is the optimal bargaining arrangement, we must consider the enormous challenges workers in the technology sector face in obtaining these protections

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Get PDF
    Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war

    Online Dispute Resolution Through the Lens of Bargaining and Negotiation Theory: Toward an Integrated Model

    Get PDF
    [Excerpt] In this article we apply negotiation and bargaining theory to the analysis of online dispute resolution. Our principal objective is to develop testable hypotheses based on negotiation theory that can be used in ODR research. We have not conducted the research necessary to test the hypotheses we develop; however, in a later section of the article we suggest a possible methodology for doing so. There is a vast literature on negotiation and bargaining theory. For the purposes of this article, we realized at the outset that we could only use a small part of that literature in developing a model that might be suitable for empirical testing. We decided to use the behavioral theory of negotiation developed by Richard Walton and Robert McKersie, which was initially formulated in the 1960s. This theory has stood the test of time. Initially developed to explain union-management negotiations, it has proven useful in analyzing a wide variety of disputes and conflict situations. In constructing their theory, Walton and McKersie built on the contributions and work of many previous bargaining theorists including economists, sociologists, game theorists, and industrial relations scholars. In this article, we have incorporated a consideration of the foundations on which their theory was based. In the concluding section of the article we discuss briefly how other negotiation and bargaining theories might be applied to the analysis of ODR

    School Leader Update, February 2008

    Get PDF
    Monthly newsletter produced by Iowa Department of Educatio
    • 

    corecore