62,344 research outputs found

    Make it so! Jean-Luc Picard, Bart Simpson and the design of e-public services

    Get PDF
    In this paper, we report on a project applying participatory design methods to include people who have experience of social exclusion (in one form or another) in designing possible technologies for e-(local)-government services. The work was part of a project for the Office of the Deputy Prime Minister in the UK, and was concerned with ‘access tokens’ that can provide personal identification for individuals accessing public services, based on technologies such as multi-functional smartcards, flash memory sticks, mobile phone SIMs or similar devices. In particular we report on our experience using the ‘pastiche scenarios’ technique recently developed by Mark Blythe. Our findings indicate that the technique can be effective and engaging in helping people to create realistic scenarios of future technology use and highlight some possible pitfalls to consider when using this technique.</p

    Strong Cryptography: The Global Tide of Change

    Get PDF
    Encryption technology allows people using electronic networks to ensure that the messages they send remain private--secure from hackers, industrial espionage, government wiretap abuses, and spies. Encryption technology will prove vital to the future of electronic commerce. For example, thefts of nuclear secrets from U.S. national laboratories would be much less likely if the labs' commercial software had built-in encryption features that could be used to limit unauthorized access--a type of security product discouraged by export controls. For years the U.S. government has struggled unsuccessfully to control the export of encryption technology from this country. Those ineffectual controls do, however, adversely affect the competitive position of the U.S. software industry and national security. Despite the controls, powerful encryption products are increasingly available around the world. Those products include Pretty Good Privacy, which offers 128-bit encryption, and many others. This paper provides a list of Web sites where such products may be found, thus establishing beyond doubt the futility of controls. Although some of the Web sites may from time to time disappear, others will spring up in their place

    Swords into Plowshares: Nuclear Power and the Atomic Energy Act’s Preemptive Scope in Virginia Uranium, Inc. v. Warren

    Get PDF
    This commentary highlights the considerations the Supreme Court should attend to in its decision in Virginia Uranium, Inc. v. Warren, both in construing § 2021(k) and in reviewing the Fourth Circuit’s reading of precedent from other circuits and from the Court’s prior opinions. Specifically, the Court must clarify how to interpret § 2021(k)’s activities component in concert with its “for purposes” language and determine the importance of the particular underlying activity the state seeks to regulate in a preemption analysis under the Atomic Energy Act. Clarification is necessary to ensure that courts properly effectuate Congress’s intent in regulating nuclear power, an important regulatory realm that implicates economic growth, technological development, and foreign policy

    Three Keys to the Original Meaning of the Privileges or Immunities Clause

    Get PDF
    Establishing the original meaning of the Fourteenth Amendment’s Privileges or Immunities Clause requires a wealth of evidence. But three key data points are crucial to identifying the core of its meaning. First, Supreme Court Justice Washington’s explanation of the meaning of “privileges and immunities” in Corfield v. Coryell; second, the rights protected by the Civil Rights Act of 1866; and third, Michigan Senator Jacob Howard’s speech explaining the content of the Privileges or Immunities Clause when introducing the Fourteenth Amendment to the United States Senate in 1866. Any theory of the Privileges or Immunities Clause and its original meaning that cannot comfortably accommodate these three items is highly questionable

    Performative regulation: a case study in how powerful people avoid criminal labels

    Get PDF
    This paper explores the role of invested powerful business actors in the criminalisation process as applied to the illicit antiquities market. We present a case study of the precise mechanics of the role played by trade interests in the formation of the Dealing in Cultural Objects (Offences) Act 2003. This process involved the trade’s entering appearance in the legislative process and neutralising the possible constraining effects on its members of the new criminal offence which was to be created. We begin by exploring the political, historical and economic context in which discussion of the terms of the 2003 Act first began. We then follow the Act from its genesis through its various stages of drafting and re-drafting, to its enactment. This case study of a single piece of legislation provides further data to add to the line of prior research that illustrates that powerful white-collar criminals, as well as sometimes preventing criminal legislation entering the statute books, can also influence the design of criminal legislation that does enter the statute books in order to protect themselves and their own business interests. We also use this case study of a process of contemporary law-making to outline the concept of performative regulation: broadly, that which in appearance serves political ends but in practice effects an inconsequential level of control

    Privacy preserving protocol for detecting genetic relatives using rare variants.

    Get PDF
    MotivationHigh-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test.ResultsIn this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals.AvailabilityThe software is freely available for download at http://genetics.cs.ucla.edu/crypto/
    • 

    corecore