616 research outputs found

    Creating the Virtual Library

    Get PDF
    Workshop presentation paper by Jules Winterton (Associate Director and Librarian, Institute of Advanced Legal Studies) providing an understanding of the key issues to be considered in creating and managing collections of electronic resources in libraries and some background to project design, funding and management

    Intellectual Property Rights of Electronic Information in the Age of Digital Convergence

    Get PDF
    The laws of intellectual property aim to protect owners of the literary, dramatic, musical, and artistic works; designs, innovations and inventions from unauthorized use or exploitation by some one else. Though every country has enacted laws to protect intellectual property of its citizens, many infringements take place and a majority of them end up in courts of law. The developments in information and communication technologies made the situation grimmer. This paper briefly explains the copyright and protection of electronic information, its security in network environment, and copyright provisions for databases, multimedia works, and computer software. The relevant provisions of the European Union, the American and the Indian legislative developments as well as the international efforts were touched. The various facets of the information Technology Act and the recently tabled Communications Convergence Bill have been discussed. Despite all the legislative efforts, a level playing field is needed for the rights owners, publishers, library professionals and user

    The Trend and Intellectual Structure of Digital Archives Research

    Get PDF
    Archives are an extremely valuable part of cultural heritage since they represent the trace of the activities of a juridical person or organization in the course of their business. Through various information technology (IT), tremendous amount of digital archives (DA) are created. These archives are the basis for providing evidence and knowledge in everlasting memory of human society. The management of digital archives becomes a fast growing field throughout last decade and introduces abundant articles in academia. However, their trend and intellectual structure have remained obscure in the research community. To map the trend and intellectual structure of DA research, this study identifies the high-impact articles as well as the correlations among these scholar publications. In this study, text mining techniques, such as co-word and cluster analysis, have been deployed to investigate the intellectual pillars of the DA literature. This study exposes researchers to a new way of profiling knowledge networks and their relationships in the research area of DA, thereby helping academia and practitioners better understand up-to-date studies. The results of the mapping can help identify the research direction of DA research, provide a valuable tool for researchers to access DA literature, and act as an exemplary model for future research

    Ethical Control of Unmanned Systems: lifesaving/lethal scenarios for naval operations

    Get PDF
    Prepared for: Raytheon Missiles & Defense under NCRADA-NPS-19-0227This research in Ethical Control of Unmanned Systems applies precepts of Network Optional Warfare (NOW) to develop a three-step Mission Execution Ontology (MEO) methodology for validating, simulating, and implementing mission orders for unmanned systems. First, mission orders are represented in ontologies that are understandable by humans and readable by machines. Next, the MEO is validated and tested for logical coherence using Semantic Web standards. The validated MEO is refined for implementation in simulation and visualization. This process is iterated until the MEO is ready for implementation. This methodology is applied to four Naval scenarios in order of increasing challenges that the operational environment and the adversary impose on the Human-Machine Team. The extent of challenge to Ethical Control in the scenarios is used to refine the MEO for the unmanned system. The research also considers Data-Centric Security and blockchain distributed ledger as enabling technologies for Ethical Control. Data-Centric Security is a combination of structured messaging, efficient compression, digital signature, and document encryption, in correct order, for round-trip messaging. Blockchain distributed ledger has potential to further add integrity measures for aggregated message sets, confirming receipt/response/sequencing without undetected message loss. When implemented, these technologies together form the end-to-end data security that ensures mutual trust and command authority in real-world operational environments—despite the potential presence of interfering network conditions, intermittent gaps, or potential opponent intercept. A coherent Ethical Control approach to command and control of unmanned systems is thus feasible. Therefore, this research concludes that maintaining human control of unmanned systems at long ranges of time-duration and distance, in denied, degraded, and deceptive environments, is possible through well-defined mission orders and data security technologies. Finally, as the human role remains essential in Ethical Control of unmanned systems, this research recommends the development of an unmanned system qualification process for Naval operations, as well as additional research prioritized based on urgency and impact.Raytheon Missiles & DefenseRaytheon Missiles & Defense (RMD).Approved for public release; distribution is unlimited

    Critique of Architectures for Long-Term Digital Preservation

    Get PDF
    Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term. TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive information—content whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind context—Trustworthy Digital Objects.

    Better Than Cash? Global Proliferation of Debit and Prepaid Cards and Consumer Protection Policy

    Get PDF
    A global deluge of debit cards and prepaid cards – payment cards that do not require consumers to qualify for credit – is rapidly making electronic payment systems accessible to much of the world’s population that previously paid in cash for goods and services. The global proliferation of payment cards is fraught with both risk and promise for consumers. The billions of people of low to moderate incomes who are being hurled from a cash economy into the era of electronic payments in emerging economies by the proliferation of debit and prepaid cards are particularly vulnerable to abuses by banks and merchants. Unregulated private lawmaking by payment card associations and card issuers will not ensure that consumers are treated fairly, due to their countervailing incentives to attract merchants into their payment networks. Technological solutions promote efficiency and limit abuse, but cannot ensure fair resolution of consumer-merchant disputes. Payment card associations such as Visa and MasterCard operate chargeback systems for resolving disputes, but chargeback systems cannot function in cash economies without merchants’ consent, because cash transactions are usually anonymous, evidenced at most by a receipt, and do not involve an intermediary. However, while the lack of anonymity inherent in the use of payment cards entails risk for consumer privacy, it also makes possible greater transparency in payment systems. As billions of vulnerable consumers become connected to electronic payment systems, chargeback systems become a possible means of protecting them from merchant misconduct. Moreover, this lack of anonymity makes possible new ways of protecting consumers, such as disclosure to consumers of outcomes of the Visa and MasterCard chargeback systems through merchant ratings such as those posted on eBay. There is a risk that nations with emerging economies will uncritically emulate regimes of consumer protection adopted in the United States and Europe. These regimes in many respects lack a consistent conceptual foundation and fail to address problems, such as bank fees, access to banking services and payment system insolvency, that are poorly addressed in developed countries if they are addressed at all. For example, debit and prepaid card transactions are both a convenient means of obtaining cash and a substitute for cash, but this does not justify denying chargeback rights to consumers who use debit and prepaid cards, as if they had paid in cash. Prior scholarship on payment cards has suffered from the assumption that American use of credit cards is normative. This article demonstrates that it is a global anomaly; most consumers worldwide use payment cards for convenience rather than a source of long-term credit, and that is why debit cards have become popular so quickly. Moreover, fees and charges imposed on consumers for payment card services are one of the most prolific sources of consumer complaints. Fee regulation should be regarded as a legitimate part of payments law in scholarship on the subject, and should not be ignored in establishing a regulatory system to govern debit and prepaid cards

    Copyright issues in digital enviornment

    Get PDF
    This paper discusses about the copyright issues in the digital environment. And it also discusses the security of information over networks.it gives a brief note about Databases and multimedia technologies also.And what all are the technologies we can use for right protection that also discusses

    The Development Impact of Information Technology in Trade Facilitation

    Get PDF
    The main purpose of this chapter is to provide an overview and context of the country studies on Information Technology (IT) for Trade Facilitation (TF) in Small and Medium Enterprises (SMEs).Impact of Information Techonology, Trade Facilitation, SMEs

    The alignment of the Saudi legal system with the international rules of electronic commerce

    Get PDF
    This thesis deals with fundamental questions of compatibility andadaptation in the regulation of electronic commerce as it impacts on the normsand precepts of Islamic law. It finds that in the Kingdom of Saudi Arabia, theresponse of the religious and civil authorities to the realignment of its laws ofcontract, in order to encompass the innovations and changes implicit in theelectronic environment, have been inhibited by misgivings about the nature ofthe electronic environment itself and by fears that some of the protectiveaspects of traditional contract formation will be lost.Based upon a detailed comparison of the various stages and components ofthe electronic and traditional contract, the thesis finds that the principlesunderlying Islamic law are not violated or substantively threatened by the newforms. It is shown that laws and treaties, created at an international level ofscrutiny and discussion, are now broadly in place and accepted by most of the‘developed’ world, with necessary allowance being made for future innovationand change.The Kingdom of Saudi Arabia, it is recommended, can only make progressin this field by a policy of greater engagement, both in respect of the nature ofthe electronic contract itself, and also with the arbiters of compromise in bodiessuch as the United Nations and the World Trade Organisation. It finds this progress to be essential to the health and well-being of Saudi society as awhole, and it suggests that any misgivings currently felt by the nation’slegislators are based more on misapprehension than on objective realities

    Applications of Deontic Logic in Computer Science: A Concise Overview

    Get PDF
    • 

    corecore