2,773 research outputs found
Privacy issues of ISPs in the modern web
In recent years, privacy issues in the networking field are getting more important. In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements. This kind of information, such as flow records or HTTP logs, carries considerable knowledge from several points of view: traffic engineering, academic research, and web marketing can take advantage from passive network measurements on ISP customers. Nevertheless, in many cases collected measurements contain personal and confidential information about customers exposed to monitoring, thus raising several ethical issues. Modern web is very different from the one we experienced few years ago: web services converged to few protocols (i.e., HTTP and HTTPS) and a large share of traffic is encrypted. The aim of this work is to provide an insight about which information is still visible to ISPs, with particular attention to novel and emerging protocols, and to what extent it carries personal information. We illustrate that sensible information, such as website history, is still exposed to passive monitoring. We illustrate privacy and ethical issues deriving by the current situation and provide general guidelines and best practices to cope with the collection of network traffic measurements
Ethical Issues in Network System Design
Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or WorldWideWeb (WWW). The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control networkrelated actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems
Updating democracy studies: outline of a research program
Technologies carry politics since they embed values. It is therefore surprising that mainstream political and legal theory have taken the issue so lightly. Compared to what has been going on over the past few decades in the other branches of practical thought, namely ethics, economics and the law, political theory lags behind. Yet the current emphasis on Internet politics that polarizes the apologists holding the web to overcome the one-to-many architecture of opinion-building in traditional representative democracy, and the critics that warn cyber-optimism entails authoritarian technocracy has acted as a wake up call. This paper sets the problem – “What is it about ICTs, as opposed to previous technical devices, that impact on politics and determine uncertainty about democratic matters?” – into the broad context of practical philosophy, by offering a conceptual map of clusters of micro-problems and concrete examples relating to “e-democracy”. The point is to highlight when and why the hyphen of e-democracy has a conjunctive or a disjunctive function, in respect to stocktaking from past experiences and settled democratic theories. My claim is that there is considerable scope to analyse how and why online politics fails or succeeds. The field needs both further empirical and theoretical work
Analyzing the patterns of ICT utilization for online public participatory planning in Queensland, Australia
Public participation in urban planning includes involving, informing, and consulting the public in planning, management, and other decision-making activities. It is an important part of the planning process, providing opportunity and encouragement for members of the public to express their views. Despite the usefulness of new technologies, however, the majority of Internet and GIS applications have not been very successful in encouraging significant public participation. One reason for this is the lack of readiness in accepting ICTs, both on the part of planning agencies, such as local councils, and members of the public. The purpose of this article is to evaluate the readiness of local councils in Queensland, Australia, to implement online urban planning. Local government authorities (LGAs) comprise the third tier of government in Australia. In Queensland, the local councils have statutory powers over land use zoning and the development approval processes. LGAs develop and implement strategic and local plans, including those for land use. This article considers the extent to which local councils are willing to embrace ICTs as a public participation tool and the extent to which households might be ready to access new computer technologies
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites
Website owners make conscious and unconscious decisions that affect their
users, potentially exposing them to privacy and security risks in the process.
In this paper we introduce PrivacyScore, an automated website scanning portal
that allows anyone to benchmark security and privacy features of multiple
websites. In contrast to existing projects, the checks implemented in
PrivacyScore cover a wider range of potential privacy and security issues.
Furthermore, users can control the ranking and analysis methodology. Therefore,
PrivacyScore can also be used by data protection authorities to perform
regularly scheduled compliance checks. In the long term we hope that the
transparency resulting from the published benchmarks creates an incentive for
website owners to improve their sites. The public availability of a first
version of PrivacyScore was announced at the ENISA Annual Privacy Forum in June
2017.Comment: 14 pages, 4 figures. A german version of this paper discussing the
legal aspects of this system is available at arXiv:1705.0888
Net:Geography Fieldwork Frequently Asked Questions
Abstract included in text
Defamation on the Internet: an analytical study of defamation law and the Internet in England and Wales: 1996 to 2009
For many decades, defamation law in England in Wales has predominantly only had to deal with material that has been published via printed publications, radio and television. As such, defamation law has been tailored to best suit these media. Since the introduction of the Internet, defamation law has been tested to its limits with a number of commentators arguing that it is not equipped to deal with the uniqueness of
the online publications. Consequently, Internet service providers, content hosts and Internet users are all at risk of being held as the publisher and being sued for defamation, potentially, anywhere in the world, even if they had no prior knowledge of the material in question. Previous research regarding the Internet and defamation has been scarce. This
research has set out to gain a greater understanding of the problems facing Internet
service providers and the threats to freedom of expression on the Internet caused by defamation law, procedures and practice. This has been achieved by conducting an indepth desk research of academic text, press commentary and case law followed by interviews with Internet service providers, content hosts and lawyers with an expertise of defamation. Initial assumptions were that defamation law, procedures and practice was threatening freedom of expression on the Internet. This proved to be correct and of great concern to the Internet publishing community. It was also found that defamation law procedure and practice was in many cases efficient in the removal of alleged defamatory (Internet based) material and in its attempt to restore a person s reputation. It has been concluded that parts of defamation law in England and Wales could be
revised to improve the preservation of freedom of expression on the Internet. Furthermore, current defamation law coupled with defamation procedures and practice are leaving Internet publishers vulnerable to vexatious claims of defamation.
There is also evidence to suggest that conditional fee agreements used within
defamation legal practice are becoming more popular for defamation cases and consequently, threatening freedom of expression on the Internet.
Finally, Internet defamation cases and disputes are becoming a greater part of a defamation lawyer's practice and in some practices becoming more popular than traditional printed libel cases. It is for this reason that the results, conclusions and recommendations of this research are of a timely nature and of significant importance to the field of Internet publishing
- …