2,773 research outputs found

    Privacy issues of ISPs in the modern web

    Get PDF
    In recent years, privacy issues in the networking field are getting more important. In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements. This kind of information, such as flow records or HTTP logs, carries considerable knowledge from several points of view: traffic engineering, academic research, and web marketing can take advantage from passive network measurements on ISP customers. Nevertheless, in many cases collected measurements contain personal and confidential information about customers exposed to monitoring, thus raising several ethical issues. Modern web is very different from the one we experienced few years ago: web services converged to few protocols (i.e., HTTP and HTTPS) and a large share of traffic is encrypted. The aim of this work is to provide an insight about which information is still visible to ISPs, with particular attention to novel and emerging protocols, and to what extent it carries personal information. We illustrate that sensible information, such as website history, is still exposed to passive monitoring. We illustrate privacy and ethical issues deriving by the current situation and provide general guidelines and best practices to cope with the collection of network traffic measurements

    Ethical Issues in Network System Design

    Get PDF
    Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or WorldWideWeb (WWW). The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control networkrelated actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems

    Updating democracy studies: outline of a research program

    Get PDF
    Technologies carry politics since they embed values. It is therefore surprising that mainstream political and legal theory have taken the issue so lightly. Compared to what has been going on over the past few decades in the other branches of practical thought, namely ethics, economics and the law, political theory lags behind. Yet the current emphasis on Internet politics that polarizes the apologists holding the web to overcome the one-to-many architecture of opinion-building in traditional representative democracy, and the critics that warn cyber-optimism entails authoritarian technocracy has acted as a wake up call. This paper sets the problem – “What is it about ICTs, as opposed to previous technical devices, that impact on politics and determine uncertainty about democratic matters?” – into the broad context of practical philosophy, by offering a conceptual map of clusters of micro-problems and concrete examples relating to “e-democracy”. The point is to highlight when and why the hyphen of e-democracy has a conjunctive or a disjunctive function, in respect to stocktaking from past experiences and settled democratic theories. My claim is that there is considerable scope to analyse how and why online politics fails or succeeds. The field needs both further empirical and theoretical work

    Analyzing the patterns of ICT utilization for online public participatory planning in Queensland, Australia

    Get PDF
    Public participation in urban planning includes involving, informing, and consulting the public in planning, management, and other decision-making activities. It is an important part of the planning process, providing opportunity and encouragement for members of the public to express their views. Despite the usefulness of new technologies, however, the majority of Internet and GIS applications have not been very successful in encouraging significant public participation. One reason for this is the lack of readiness in accepting ICTs, both on the part of planning agencies, such as local councils, and members of the public. The purpose of this article is to evaluate the readiness of local councils in Queensland, Australia, to implement online urban planning. Local government authorities (LGAs) comprise the third tier of government in Australia. In Queensland, the local councils have statutory powers over land use zoning and the development approval processes. LGAs develop and implement strategic and local plans, including those for land use. This article considers the extent to which local councils are willing to embrace ICTs as a public participation tool and the extent to which households might be ready to access new computer technologies

    PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites

    Full text link
    Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process. In this paper we introduce PrivacyScore, an automated website scanning portal that allows anyone to benchmark security and privacy features of multiple websites. In contrast to existing projects, the checks implemented in PrivacyScore cover a wider range of potential privacy and security issues. Furthermore, users can control the ranking and analysis methodology. Therefore, PrivacyScore can also be used by data protection authorities to perform regularly scheduled compliance checks. In the long term we hope that the transparency resulting from the published benchmarks creates an incentive for website owners to improve their sites. The public availability of a first version of PrivacyScore was announced at the ENISA Annual Privacy Forum in June 2017.Comment: 14 pages, 4 figures. A german version of this paper discussing the legal aspects of this system is available at arXiv:1705.0888

    Defamation on the Internet: an analytical study of defamation law and the Internet in England and Wales: 1996 to 2009

    Get PDF
    For many decades, defamation law in England in Wales has predominantly only had to deal with material that has been published via printed publications, radio and television. As such, defamation law has been tailored to best suit these media. Since the introduction of the Internet, defamation law has been tested to its limits with a number of commentators arguing that it is not equipped to deal with the uniqueness of the online publications. Consequently, Internet service providers, content hosts and Internet users are all at risk of being held as the publisher and being sued for defamation, potentially, anywhere in the world, even if they had no prior knowledge of the material in question. Previous research regarding the Internet and defamation has been scarce. This research has set out to gain a greater understanding of the problems facing Internet service providers and the threats to freedom of expression on the Internet caused by defamation law, procedures and practice. This has been achieved by conducting an indepth desk research of academic text, press commentary and case law followed by interviews with Internet service providers, content hosts and lawyers with an expertise of defamation. Initial assumptions were that defamation law, procedures and practice was threatening freedom of expression on the Internet. This proved to be correct and of great concern to the Internet publishing community. It was also found that defamation law procedure and practice was in many cases efficient in the removal of alleged defamatory (Internet based) material and in its attempt to restore a person s reputation. It has been concluded that parts of defamation law in England and Wales could be revised to improve the preservation of freedom of expression on the Internet. Furthermore, current defamation law coupled with defamation procedures and practice are leaving Internet publishers vulnerable to vexatious claims of defamation. There is also evidence to suggest that conditional fee agreements used within defamation legal practice are becoming more popular for defamation cases and consequently, threatening freedom of expression on the Internet. Finally, Internet defamation cases and disputes are becoming a greater part of a defamation lawyer's practice and in some practices becoming more popular than traditional printed libel cases. It is for this reason that the results, conclusions and recommendations of this research are of a timely nature and of significant importance to the field of Internet publishing
    • …
    corecore