76,529 research outputs found

    Anatomy of the Third-Party Web Tracking Ecosystem

    Full text link
    The presence of third-party tracking on websites has become customary. However, our understanding of the third-party ecosystem is still very rudimentary. We examine third-party trackers from a geographical perspective, observing the third-party tracking ecosystem from 29 countries across the globe. When examining the data by region (North America, South America, Europe, East Asia, Middle East, and Oceania), we observe significant geographical variation between regions and countries within regions. We find trackers that focus on specific regions and countries, and some that are hosted in countries outside their expected target tracking domain. Given the differences in regulatory regimes between jurisdictions, we believe this analysis sheds light on the geographical properties of this ecosystem and on the problems that these may pose to our ability to track and manage the different data silos that now store personal data about us all

    UN Global Pulse: Annual Report 2013

    Get PDF
    Through public-private partnerships, innovative analysis and the development of open-source methodologies, Global Pulse is strengthening public sector capacity to leverage digital Big Data for development and resilience. This report provides a brief overview of advances made during 2013

    Design, Privacy and Authentication of Challenge Questions in Online Examinations

    Get PDF
    Online examination is an essential part of the online learning and secure authentication is considered vital for the success of online learning. This study is part of an ongoing research on student authentication approaches and the use of challenge questions in online examination authentication. This paper presents the results of an empirical study based on “Profile Based Authentication Framework” (PBAF), which uses challenge questions for student authentication in online examination. The PBAF uses challenge questions related to personal, academic and professional information. These questions inform the usability, security and privacy of PBAF authentication approach. The results presented here summarizes the impact of questions design on the usability based on data collected from challenge questions authentication and a post-experiment survey on the data privac

    Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland

    Get PDF
    The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States. The analysis of institutional system - providing legal security of communication and information institutions, companies and citizens against the dangers arising from the ongoing development of innovative new technologies in the European Union and Poland. This article is an attempt to analyze the possibility of using security systems and Biometry CTTV in Poland in terms of legislation. The results of the analysis indicate that, in terms of institutions Poland did not do badly in relation to the risks arising from the implementation of technology. The situation is not as good when it comes to the awareness of citizens and small businesses. This requires that facilitate greater access to free security software companies from data leakage or uncontrolled cyber-terrorist attacks. With regard to the use of security systems, CCTV and biometrics, Poland in legal terms is still early in the process of adapting to EU Directive. The continuous development of technology should force the legislature to establish clear standards and regulations for the application of CCTV technology and biometrics, as it is of great importance in ensuring the fundamental rights and freedoms of every citizen of the Polish Republic.Wyniki analizy wskazują, że pod względem instytucji Polska nie wypada źle w odniesieniu do zagrożeń wynikających z wdrożenia technologii. Sytuacja nie jest tak dobra, jeśli chodzi o świadomość obywateli i mniejszych firm. Wymaga to ułatwiania szerszego dostępu do darmowych programów zabezpieczających firmy przed wyciekiem danych lub niekontrolowanych cyber-ataków terrorystycznych. W odniesieniu do stosowania systemów zabezpieczeń CCTV oraz biometrii, Polska pod względem prawnym jest wciąż na początku procesu dostosowania do dyrektywy UE. Ciągły rozwój technologii powinien zmusić ustawodawcę do stworzenia jednoznacznych standardów i przepisów obowiązujących w zakresie stosowania technologii CCTV oraz biometrii, gdyż ma to ogromne znaczenie w zapewnieniu podstawowych praw i wolności każdego obywatela Rzeczypospolitej Polskiej

    Law & Healthcare Newsletter, v. 22, no. 2, Spring 2015

    Get PDF
    corecore