42 research outputs found

    Abuses of Dominant ICT Companies in the Area of Data Protection

    Get PDF

    Chainspace: A Sharded Smart Contracts Platform

    Full text link
    Chainspace is a decentralized infrastructure, known as a distributed ledger, that supports user defined smart contracts and executes user-supplied transactions on their objects. The correct execution of smart contract transactions is verifiable by all. The system is scalable, by sharding state and the execution of transactions, and using S-BAC, a distributed commit protocol, to guarantee consistency. Chainspace is secure against subsets of nodes trying to compromise its integrity or availability properties through Byzantine Fault Tolerance (BFT), and extremely high-auditability, non-repudiation and `blockchain' techniques. Even when BFT fails, auditing mechanisms are in place to trace malicious participants. We present the design, rationale, and details of Chainspace; we argue through evaluating an implementation of the system about its scaling and other features; we illustrate a number of privacy-friendly smart contracts for smart metering, polling and banking and measure their performance

    Tackling the barriers to achieving Information Assurance

    Get PDF
    A thesis submitted in partial fulfilment of the requirements of the University of Wolverhampton for the degree of Doctor of Philosophy.This original, reflective practitioner study researched whether professionalising IA could be successfully achieved, in line with the UK Cyber Security Strategy expectations. The context was an observed changing dominant narrative from IA to cybersecurity. The research provides a dialectical relationship with the past to improve IA understanding. The Academic contribution: Using archival and survey data, the research traced the origins of the term IA and its practitioner usage, in the context of the increasing use of the neologism of cybersecurity, contributing to knowledge through historical research. Discourse analysis of predominantly UK government reports, policy direction, legislative and regulatory changes, reviewing texts to explore the functions served by specific constructions, mainly Information Security (Infosec) vs IA. The Researcher studied how accounts were linguistically constructed in terms of the descriptive, referential and rhetorical language used, and the function that serves. The results were captured in a chronological review of IA ontology. The Practitioner contribution: Through an initial Participatory Action Research (PAR) public sector case study, the researcher sought to make sense of how the IA profession operates and how it was maturing. Data collection from self-professed IA practitioners provided empirical evidence. The researcher undertook evolutionary work analysing survey responses and developed theories from the analysis to answer the research questions. The researcher observed a need to implement a unified approach to Information Governance (IG) on a large organisation-wide scale. Using a constructivist grounded theory the researcher developed a new theoretical framework - i3GRC™ (Integrated and Informed Information Governance, Risk, and Compliance) - based on what people actually say and do within the IA profession. i3GRC™ supports the required Information Protection (IP) through maturation from IA to holistic IG. Again, using PAR, the theoretical framework was tested through a private sector case study, the resultant experience strengthening the bridge between academia and practitioners

    Central and Eastern European e|Dem and e|Gov Days 2020

    Get PDF

    Unmet goals of tracking: within-track heterogeneity of students' expectations for

    Get PDF
    Educational systems are often characterized by some form(s) of ability grouping, like tracking. Although substantial variation in the implementation of these practices exists, it is always the aim to improve teaching efficiency by creating homogeneous groups of students in terms of capabilities and performances as well as expected pathways. If students’ expected pathways (university, graduate school, or working) are in line with the goals of tracking, one might presume that these expectations are rather homogeneous within tracks and heterogeneous between tracks. In Flanders (the northern region of Belgium), the educational system consists of four tracks. Many students start out in the most prestigious, academic track. If they fail to gain the necessary credentials, they move to the less esteemed technical and vocational tracks. Therefore, the educational system has been called a 'cascade system'. We presume that this cascade system creates homogeneous expectations in the academic track, though heterogeneous expectations in the technical and vocational tracks. We use data from the International Study of City Youth (ISCY), gathered during the 2013-2014 school year from 2354 pupils of the tenth grade across 30 secondary schools in the city of Ghent, Flanders. Preliminary results suggest that the technical and vocational tracks show more heterogeneity in student’s expectations than the academic track. If tracking does not fulfill the desired goals in some tracks, tracking practices should be questioned as tracking occurs along social and ethnic lines, causing social inequality

    To be Young! : Youth and the Future. Proceedings of the Conference “To be Young! Youth and the Future”, 6–8 June 2012, Turku, Finland

    Get PDF
    What does it mean to be young today and what will it mean in the coming years in this rapidly changing world? What the future of youth could be and look like? The aim of the “To be Young” conference in July 2012 was to perceive and create futures through the eyes of today’s youth, adults and decision makers for the young people of the future. The course of a youth’s life, both today and toward the future covers an entire spectrum of reality. Focusing on faith in young people, their ability and determination to build an inevitably different and in many ways and hopefully improved world for us all to live in was the focal point of this conference. This book collects some of the presentations and papers presented in the conference. Articles selected in this book cover several approaches of youth research. Topics include politics, education, gender questions, futures methodologies, young immigrants just to mention a few. We thank the authors and referees for their work. The conference was organized in association with the Finland Futures Academy and the Finnish Youth Research Network. The “To Be Young” conference marked Finland Futures Research Centre’s 14th Annual International Conference and its 20th Anniversary celebrating twenty years of academic research, education and development work

    Scanning the European Ecosystem of Distributed Ledger Technologies for Social and Public Good: What, Why, Where, How, and Ways to Move Forward

    Get PDF
    Distributed Ledger Technologies (DLTs), such as blockchains, are primarily tamper-resistant and time-stamped databases. They allow multiple parties to record, verify and share data on a peer-to-peer basis across a network, in decentralised, synchronised and transparent ways, with limited human intervention and reduced intermediate steps. These technologies are mostly known for business use cases, from cryptocurrencies to asset track and tracing. But there are numerous organisations nowadays searching for alternative ways to harness the potential of DLTs in the pursuit of public and social good, from local to global challenges, and towards more inclusive, cooperative, sustainable, ethical or accountable digital and physical worlds. This Science for Policy report explores the current status of this particular field both theoretically and empirically, in the framework of the project #DLT4Good: Co-creating a European Ecosystem of DLTs for Social and Public Good. Part I offers a conceptual overview of the connections between main features of DLTs and their potential for social and public good goals. Emphasis is placed on different approaches to decentralisation, and on core building blocks of DLTs linked with values such as trust, privacy, self-sovereignty, autonomy, inclusiveness, transparency, openness, or the commons. Part II comprises a scanning of the current European ecosystem of DLT projects with activities in this field. It contains a summarized version of a database published online with 131 projects, and a quantitative review of main trends. It also includes a qualitative assessment of 10 projects selected from the larger sample to showcase this field and its diversity. Part III concludes with six independent position papers and recommendations from experts and advisors of the #DLT4Good project. The main topics addressed range from decentralized governance to collaborative economies, with highlights on issues such as trust, verifiability, transparency, privacy or bottom-up coordination.JRC.I.2-Foresight, Modelling, Behavioural Insights & Design for Polic
    corecore