8,848 research outputs found

    Digital Architecture as Crime Control

    Get PDF
    This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House\u27s recent proposals on cybersecurity. The paper begins by introducing four concepts of realspace crime prevention through architecture. Design should: (1) create opportunities for natural surveillance, meaning its visibility and susceptibility to monitoring by residents, neighbors, and bystanders; (2) instill a sense of territoriality so that residents develop proprietary attitudes and outsiders feel deterred from entering a private space; (3) build communities and avoid social isolation; and (4) protect targets of crime. There are digital analogues to each goal. Natural-surveillance principles suggest new virtues of open-source platforms, such as Linux, and territoriality outlines a strong case for moving away from digital anonymity towards psuedonymity. The goal of building communities will similarly expose some new advantages for the original, and now eroding, end-to-end design of the Internet. An understanding of architecture and target prevention will illuminate why firewalls at end points will more effectively guarantee security than will attempts to bundle security into the architecture of the Net. And, in total, these architectural lessons will help us chart an alternative course to the federal government\u27s tepid approach to computer crime. By leaving the bulk of crime prevention to market forces, the government will encourage private barricades to develop - the equivalent of digital gated communities - with terrible consequences for the Net in general and interconnectivity in particular

    Cryptocurrencies Are Taxable and Not Free From Fraud

    Get PDF
    In this report, the authors discuss cryptocurrencies — especially bitcoin — and argue that because the IRS lists them as property, they are taxable, and because they are not as anonymous as once thought, they are not free from fraud. Cryptocurrencies are digital assets used as a medium of exchange, but they are not really coins. They can be sent electronically from one entity to another almost anywhere in the world with an internet connection. There are many cryptocurrencies in the market, including bitcoin, ethereum, ethereum classic, litecoin, nem, dash, iota, bitshares, monero, neo, and ripple. Many of the cryptocurrency networks are not controlled by a single entity or company; instead, a decentralized network of computers keeps track of the currency using a token ID. A ledger maintains a continuously growing list of date stamped transactions in real time called “blocks.” This technology is known as blockchain, which records, verifies, and stores transactions without a trusted central authority. The network instead relies on decentralized autonomous organizations (DAOs) with uncertain legal standing

    The Systematization of Disturbances Act upon E-commerce Systems

    Get PDF
    There are many processes on Internet, on web servers, in ERP and company running an e-commerce system which can be influenced by disturbances. In order to minimize their impact it is necessary to identify and collect all disturbances, to determine their evaluation metric and to propose necessary remedies. Modifications proposed should be tested by means of modeling taking internal and external environment needs into consideration. Necessary information can be captured using the e-commerce system components monitoring. Particular system environment properties like company structure, system architecture, hardware, software, methods of connection with the supplierÂŽs e-commerce system, customer communication interface are to be taken into account. Important social indicators like legislative and economic development, development of the global information society and others should also be considered. Disturbance and failure models can be designed using various methods like e.g. multi-agents modeling, simulations, fuzzy methods modeling etc. Generic ecommerce system model using control circuit as a fundamental notion can be used as a base for modeling.e-commerce system, disturbances, categorization of disturbances, modeling of disturbances, agent, simulation of disturbances

    Community Self Help

    Get PDF
    This paper advocates controlling crime through a greater emphasis on precautions taken not by individuals, but by communities. The dominant battles in the literature today posit two central competing models of crime control. In one, the standard policing model, the government is responsible for the variety of acts that are necessary to deter and prosecute criminal acts. In the other, private self-help, public law enforcement is largely supplanted by providing incentives to individuals to self-protect against crime. There are any number of nuances and complications in each of these competing stories, but the literature buys into this binary matrix

    Decoding the "Free/Open Source(F/OSS) Software Puzzle" a survey of theoretical and empirical contributions

    Get PDF
    F/OSS software has been described by many as a puzzle. In the past five years, it has stimulated the curiosity of scholars in a variety of fields, including economics, law, psychology, anthropology and computer science, so that the number of contributions on the subject has increased exponentially. The purpose of this paper is to provide a sufficiently comprehensive account of these contributions in order to draw some general conclusions on the state of our understanding of the phenomenon and identify directions for future research. The exercise suggests that what is puzzling about F/OSS is not so much the fact that people freely contribute to a good they make available to all, but rather the complexity of its institutional structure and its ability to organizationally evolve over time.F/OSS software, Innovation, Incentives, Governance, Intellectual Property Rights

    Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield

    Get PDF
    As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional weaponry that can create devastating real-world consequences. The international legal system must adapt to this battleground and provide workable mechanisms to hold aggressive actors accountable for their actions. The International Criminal Court--the only criminal tribunal in the world with global reach--holds significant promise in addressing this threat. The Assembly of State Parties should construct the definition of aggression to include these emerging challenges. By structuring the definition to confront the challenges of cyberspace--specifically non-State actors, the disaggregation of warfare, and new conceptions of territoriality--the International Criminal Court can become a viable framework of accountability for the wars of the twenty-first century

    Limitation of Sales Warranties as an Alternative to Intellectual Property Rights: An Empirical Analysis of IPhone Warranties’ Deterrent Impact on Consumers

    Get PDF
    Apple\u27s success with the Apple iPhone has brought with it certain problems. Its success has engendered a community that has attempted to circumvent Apple\u27s exclusive service agreement with AT&T. Unfortunately for Apple (and similarly situated manufacturers), intellectual property law allows consumers to alter their products so as to circumvent relationships that manufacturers may have with others. The patent and copyright law first sale doctrine allows consumers to manipulate a product after it is purchased. As a result, manufacturers are increasingly turning to alternatives to intellectual property to secure control over the device after the sale. One such alternative is the exclusion of warranty under Article 2 of the Uniform Commercial Code. This iBrief considers whether limitation of warranties have the deterrence effect manufacturers desire. Said differently, it considers whether manufacturers can use warranty limitations to prevent consumers from using their products in an unauthorized manner. The iBrief presents a behavioral model based on the Triandis model of planned behavior and enhances the model by accounting for likely and unlikely benefits and detriments. The model suggests that participants weigh the probability and magnitude of the detriment against the probability and magnitude of the beneficial impact when making the decision to engage in technological piracy. This model, considered with other empirical evidence, suggests that Apple\u27s warranty could be a stronger deterrent for consumers than civil liability. The iBrief concludes that manufacturers can better protect their post-sale expectation of profits by raising consumer awareness of their warranty\u27s quality and by raising awareness of the consequences for using the product in a way that is outside the terms of the consumers\u27 authorized use

    After the Gold Rush: The Boom of the Internet of Things, and the Busts of Data-Security and Privacy

    Get PDF
    This Article addresses the impact that the lack of oversight of the Internet of Things has on digital privacy. While the Internet of Things is but one vehicle for technological innovation, it has created a broad glimpse into domestic life, thus triggering several privacy issues that the law is attempting to keep pace with. What the Internet of Things can reveal is beyond the control of the individual, as it collects information about every practical aspect of an individual’s life, and provides essentially unfettered access into the mind of its users. This Article proposes that the federal government and the state governments bend toward consumer protection while creating a cogent and predictable body of law surrounding the Internet of Things. Through privacy-by-design or self-help, it is imperative that the Internet of Things—and any of its unforeseen progeny—develop with an eye toward safeguarding individual privacy while allowing technological development

    Hackers, Users, Information Security

    Get PDF
    • 

    corecore