79 research outputs found

    Trusted computing or trust in computing? Legislating for trust networks

    Get PDF
    This thesis aims to address several issues emerging in the new digital world. Using Trusted Computing as the paradigmatic example of regulation though code that tries to address the cyber security problem that occurs, where the freedom of the user to reconfigure her machine is restricted in exchange for greater, yet not perfect, security. Trusted Computing is a technology that while it aims to protect the user, and the integrity of her machine and her privacy against third party users, it discloses more of her information to trusted third parties, exposing her to security risks in case of compromising occurring to that third party. It also intends to create a decentralized, bottom up solution to security where security follows along the arcs of an emergent “network of trust”, and if that was viable, to achieve a form of code based regulation. Through the analysis attempted in this thesis, we laid the groundwork for a refined assessment, considering the problems that Trusted Computing Initiative (TCI) faces and that are based in the intentional, systematic but sometimes misunderstood and miscommunicated difference (which as we reveal results directly in certain design choices for TC) between the conception of trust in informatics (“techno-trust”) and the common sociological concept of it. To reap the benefits of TCI and create the dynamic “network of trust”, we need the sociological concept of trust sharing the fundamental characteristics of transitivity and holism which are absent from techno-trust. This gives rise to our next visited problems which are: if TC shifts the power from the customer to the TC provider, who takes on roles previously reserved for the nation state, then how in a democratic state can users trust those that make the rules? The answer lies partly in constitutional and human rights law and we drill into those functions of TC that makes the TCI provider comparable to state-like and ask what minimal legal guarantees need to be in place to accept, trustingly, this shift of power. Secondly, traditional liberal contract law reduces complex social relations to binary exchange relations, which are not transitive and disrupt rather than create networks. Contract law, as we argue, plays a central role for the way in which the TC provider interacts with his customers and this thesis contributes in speculating of a contract law that does not result in atomism, rather “brings in” potentially affected third parties and results in holistic networks. In the same vein, this thesis looks mainly at specific ways in which law can correct or redefine the implicit and democratically not validated shift of power from customer to TC providers while enhancing the social environment and its social trust within which TC must operate

    Conceptualising automated driving shared control hazard causes

    Get PDF
    The motivation for this research was the realisation that the introduction of greater vehicle automation would not only change the task of driving but would also potentially change how vehicles are developed and safety is assured. Undertaking a practice-based workshop identified many Automated Driving (AD) safety assurance challenges having different levels of human-machine control. These challenges include an increase in the size and complexity of AD safety analyses, a need to re-examine the notion of controllability in the context of shared control, and the need to conceptualise the vehicle as a system of systems. To begin addressing these challenges and to answer the research question “how can the safety of AD be assured under different levels of shared control?” this research has created three products: a vehicle model and behavioural competency taxonomy that allows AD shared control to be conceptualised, a concrete hazard analysis method for analysing AD shared control hazard causes, and a safety case argument pattern for that. A series of case studies evaluate the research products described above. These cases have used contemporary AD vehicle features, having varying levels of automation. The evaluation of driver assistance, partial and conditional automation cases have been completed by the author. Complementing these is the analysis of a highly automated vehicle system, which has been undertaken with the engineering team from Oxbotica. Considered together these case studies establish the research products as a proof-of-concept hazard analysis method for AD shared control. Further evaluation work is needed to test the viability of the method as an engineering tool for use by automotive practitioners working in a product development environment

    Harmonisation and Cybercrime Jurisdiction: Uneasy Bedfellows? An analysis of the jurisdictional trajectories of the Council of Europe’s Cybercrime Convention

    Get PDF
    This thesis examines the Council of Europe’s Cybercrime Convention and suggests there is a structural imbalance: while improving the procedures for investigating cybercrimes, it has failed to address the prosecutorial complexities and disputes resulting from multijurisdictional cybercrimes, by following the usual trend of ‘suppression’ conventions. This trend is to expand the procedural mechanisms through which States can acquire evidence in relation to the ‘suppressed’ offences, while suggesting that State Parties adopt broad rules in relation to criminal jurisdiction. These procedural powers have provided powerful tools for policing cybercrime, and the Convention has been innovative by developing mechanisms for facilitating networking interactions between law enforcement, and on most interpretations, even providing for directly contacting foreign service providers for data. The traditional limitations of enforcement jurisdiction are gradually being transformed, but the resulting difficulties for jurisdictional concurrency are not appreciated. Given the malleability of the concept of ‘territoriality’, and the flexibility afforded in international law in its interpretation, seizures of jurisdiction over many cybercrimes have sometimes been on the most tenuous of grounds. This results in a problem of concurrent jurisdiction on a scale previously unseen in the context of other transnational offences. It is often assumed that once substantive criminal harmonisation occurs, jurisdictional conflict between States dissipates, but I highlight three areas where concurrency is beginning to generate difficulties: investigatory and prosecutorial negotiations, cybercrime extraditions, and the law relating to ne bis in idem. I argue that these problems are only going to be exacerbated given the inroads that are being made in investigative powers and enforcement jurisdiction, coupled with the global reach of cybercrime which brings more and more States into play. I provide both the theoretical and practical case for more refined approaches towards the concept of territoriality, and consider some of the potential mechanisms for dealing with these uneasy bedfellows in the Cybercrime Convention.Graduate Teaching Assistant PhD scholarship, Queen Mary University of Londo

    The Psychologist as Expert Witness: Science in the Courtroom?

    Get PDF

    Bodies as Evidence

    Get PDF
    From biometrics to predictive policing, contemporary security relies on sophisticated scientific evidence-gathering and knowledge-making focused on the human body. Bringing together new anthropological perspectives on the complexities of security in the present moment, the contributors to Bodies as Evidence reveal how bodies have become critical sources of evidence that is organized and deployed to classify, recognize, and manage human life. Through global case studies that explore biometric identification, border control, forensics, predictive policing, and counterterrorism, the contributors show how security discourses and practices that target the body contribute to new configurations of knowledge and power. At the same time, margins of error, unreliable technologies, and a growing suspicion of scientific evidence in a “post-truth” era contribute to growing insecurity, especially among marginalized populations

    Design Development Test and Evaluation (DDT and E) Considerations for Safe and Reliable Human Rated Spacecraft Systems

    Get PDF
    A team directed by the NASA Engineering and Safety Center (NESC) collected methodologies for how best to develop safe and reliable human rated systems and how to identify the drivers that provide the basis for assessing safety and reliability. The team also identified techniques, methodologies, and best practices to assure that NASA can develop safe and reliable human rated systems. The results are drawn from a wide variety of resources, from experts involved with the space program since its inception to the best-practices espoused in contemporary engineering doctrine. This report focuses on safety and reliability considerations and does not duplicate or update any existing references. Neither does it intend to replace existing standards and policy

    Sixth Annual Workshop on Space Operations Applications and Research (SOAR 1992), volume 2

    Get PDF
    This document contains papers presented at the Space Operations, Applications, and Research Symposium (SOAR) hosted by the U.S. Air Force (USAF) on 4-6 Aug. 1992. The symposium was cosponsored by the Air Force Material Command and by NASA/JSC. Key technical areas covered during the symposium were robotics and telepresence, automation and intelligent systems, human factors, life sciences, and space maintenance and servicing. The SOAR differed from most other conferences in that it was concerned with Government-sponsored research and development relevant to aerospace operations. Symposium proceedings include papers covering various disciplines presented by experts from NASA, the USAF, universities, and industry
    corecore