287 research outputs found

    Governing the Digital Future

    Get PDF
    This report is part of a multiyear project undertaken by New America's Planetary Politics initiative on the geopolitics and global governance of the digital domain. The report analyzes divides and debates in key digital issue areas, maps the state of the global digital governance landscape, and identifies priorities for global action. The analysis draws on a review of the literature and a series of consultations and workshops held from January through June 2023. It is especially informed by the insights of the Digital Futures Task Force, an international, multidisciplinary group of researchers, technologists, and policymakers that convened at New America's Washington, DC, office for intensive discussions on these issues

    Kyberturvallisuuden arvokonfliktit kotona selviytymistÀ tukevissa terveysteknologiossa: Suunnittelutieteellinen tutkimus kohti eettistÀ pÀÀtöksentekoa

    Get PDF
    The transition of health care and health services to information networks raises ethical challenges. Especially when designing digital solutions for older citizens, their rights and opportunities to live a good life at home or in a homelike environment must be taken into account. In this case, ethics and ethical expertise play a key role, from design to implementation and evaluation. Ethics need to be looked at from a variety of perspectives, but at the same time, unfortunately, there are often value conflicts between different ethical values and norms. This design science research examines ethical issues related to the cybersecurity of digital health services through four different reference frameworks: biomedical ethics, care ethics, the core functions of health information technology, and cybersecurity core value clusters. The research focuses on value conflicts between different perspectives and presents a conceptual model for the simultaneous consideration of these different frameworks to aid ethical decision-making. In addition, the article discusses ethical decision-making through fuzzy multi-criteria decision-making and considers the use of the digital twin produced through machine learning and homomorphic encryption in this context.Terveydenhuollon ja terveyspalveluiden siirtyminen tietoverkkoihin nostaa esiin eettisiÀ haasteita. Etenkin kun digitaalisia ratkaisuja suunnitellaan ikÀÀntyville kansalaisille, tulee ottaa huomioon heidÀn oikeutensa ja mahdollisuutensa elÀÀ hyvÀÀ elÀmÀÀ kotona tai kodinomaisessa ympÀristössÀ. Etiikka ja eettinen osaaminen ovatkin tÀllöin keskeisessÀ roolissa suunnittelusta aina toteutukseen ja arviointiin saakka. Etiikkaa on tarkasteltava usealta eri nÀkökulmalta, mutta samalla valitettavan usein törmÀtÀÀn arvokonflikteihin eri eettisten arvojen ja normien vÀlillÀ. TÀmÀ suunnittelutieteellinen tutkimus tarkastelee digitaalisten terveyspalveluiden kyberturvallisuuteen liittyviÀ eettisiÀ asioita neljÀn eri viitekehyksen kautta: biolÀÀketieteen etiikka, hoitoalan etiikka, terveydenhuollon informaatioteknologian ydintehtÀvÀt ja kyberturvallisuuden arvoklusterit. Tutkimus keskittyy eri nÀkökulmien vÀlisiin arvokonflikteihin ja esittelee eettisen pÀÀtöksenteon avuksi kÀsitemallin eri viitekehysten samanaikaiseen huomioimiseen. LisÀksi artikkeli kÀsittelee eettistÀ pÀÀtöksentekoa sumean monikriteerisen pÀÀtöksenteon avulla sekÀ pohtii koneoppimisen ja homomorfisen salauksen avulla tuotettavan digitaalisen kaksosen hyödyntÀmistÀ tÀssÀ yhteydessÀ

    Exploring the Adoption of Service-Dominant Logic as an Integrative Framework for Assessing Energy Transitions

    Get PDF
    Energy transitions (ETs) can solve some societal problems but must transform societies. Accordingly, socio-technical transitions and other systemic frameworks have been used to assess ETs. However, based on these frameworks, assessments miss a value co-creation orientation, the focus on actors' researched benefits and enabled service exchange, and the consideration of needed de/re-institutionalization practices. Analyzing those elements could prevent socioeconomic shocks and loss of opportunities and unfold possible ET challenges against ET viability and sustainability. Intending to develop a theory synthesis work for enriching previous frameworks, we propose service-dominant logic (S-D logic) as an integrative framework to assess ETs. We offer a literature review on ET systems' frameworks to compare them with the proposal. We also identify the implications of adopting S-D logic for rethinking energy systems' dynamics and ETs. Thus, we contribute to the literature by providing an integrative framework for assessing ETs and we illustrate its potentialities by deriving some challenges of the current Italian ET. This study paves the way for deeper analyses on the contribution of S-D logic to ETs and the operationalization of other systems' frameworks in our integrative one. Merging with quantitative models could also follow

    Information Technology Firms: Creating Value through Digital Disruption

    Get PDF
    Information technology (IT) firms compose the majority of the most highly valued corporations in the world based on market capitalization. To date, only Apple and Amazon—both IT companies—have reached or nearly reached a USD trillion-dollar market capitalization. The value that IT provides speaks to how managers exploit disruptive technologies to create value in both IT and non-IT firms. A panel held at the 2018 Americas Conference on Information Systems (AMCIS) discussed various ways in firms build value around IT through successful management. This paper reports on the panel discussion from a variety of perspectives, which include practitioner and researcher worldviews. This panel report also provides a sample frame that researchers can use in quantitative research involving IT firms and advocates for increased research to understand the wide range of strategies IT firms use to create value

    Best Practices and Recommendations for Cybersecurity Service Providers

    Full text link
    This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers

    Divided but not poles apart : Europe, the US and the rise of China

    Get PDF
    While differences remain, the gap between US and European debates over the likely impact of China’s rise on the global order has narrowed in recent years. At the same time, China’s leaders have been more confident in establishing dichotomized distinctions between their view of how the world should be ordered and how China will act as a great power on one hand, and what they depict as the West’s preferences and the typical modus operandi of Western powers on the other. Despite evidence of ever clearer dividing lines between different visions of China’s impact on the future of the global order, this is not the same as a return to bipolarity. The problems of disentangling transnational economic relations, different levels of followership for potential leaders, and pragmatic considerations of governance efficacy in diverse issue areas all suggest something other than fixed bloc-type alliances on either side of a bipolar divide

    Ethical and Unethical Hacking

    Get PDF
    The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones

    American International Relations and Security Programs Focused on China: A Survey of the Field

    Get PDF
    Over the past 25 years, the National Committee on United States-China Relations has written five survey-based reports that provide an overview and analysis of China-related international relations and security issues at American academic centers, think tanks, and NGOs. The latest of these reports, American International Relations and Security Programs Focused on China: A Survey of the Field (2021), is a snapshot of a specific moment in time, capturing the thoughts and attitudes of the respondents — specialists and scholars in the complex field of China studies. Funded and published by Carnegie Corporation of New York, the report identifies major research gaps on the frontiers of the field, including: Emerging Technologies; China's International Economic Engagement; Data Access; Nontraditional Security Studies; and Understanding China's Political Intentions

    Negotiating Internet Governance

    Get PDF
    What is at stake for how the Internet continues to evolve is the preservation of its integrity as a single network. In practice, its governance is neither centralised nor unitary; it is piecemeal and fragmented, with authoritative decision-making coming from different sources simultaneously: governments, businesses, international organisations, technical and academic experts, and civil society. Historically, the conditions for their interaction were rarely defined beyond basic technical coordination, due at first to the academic freedom granted to the researchers developing the network and, later on, to the sheer impossibility of controlling mushrooming Internet initiatives. Today, the search for global norms and rules for the Internet continues, be it for cybersecurity or artificial intelligence, amid processes fostering the supremacy of national approaches or the vitality of a pluralist environment with various stakeholders represented. This book provides an incisive analysis of the emergence and evolution of global Internet governance, unpacking the complexity of more than 300 governance arrangements, influential debates and political negotiations over four decades. Highly accessible, this book breaks new ground through a wide empirical exploration and a new conceptual approach to governance enactment in global issue domains. A tripartite framework is employed for revealing power dynamics, relying on: a) an extensive database of mechanisms of governance for the Internet at the global and regional level; b) an in-depth analysis of the evolution of actors and priorities over time; and c) a key set of dominant practices observed in the Internet governance communities. It explains continuity and change in Internet-related negotiations, opening up new directions for thinking and acting in this field

    The Ethics of Cybersecurity

    Get PDF
    This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies
    • 

    corecore