38,924 research outputs found
In-the-wild residual data research and privacy
As the world becomes increasingly dependent on technology, researchers endeavor to understand how technology is used, the impact it has on everyday life and the life-cycle and span of digital information. In doing so, researchers are
increasingly gathering `real-world' or `in the wild' residual data, obtained from a variety of sources without the explicit consent of the original owners.
This data gathering raises significant concerns regarding privacy, ethics and legislation, as well as practical considerations concerning investigator training, data storage, overall security and disposal. This paper surveys recent studies of residual data gathered in the wild and analyses the challenges that were faced. Taking these insights, the paper presents a compendium of practices
for addressing the issues that arise in in the wild residual data research. The practices presented in this paper can be used to critique current projects and assess the feasibility of proposed future research
Ethical Reflections of Human Brain Research and Smart Information Systems
open access journalThis case study explores ethical issues that relate to the use of Smart Infor-mation Systems (SIS) in human brain research. The case study is based on the Human Brain Project (HBP), which is a European Union funded project. The project uses SIS to build a research infrastructure aimed at the advancement of neuroscience, medicine and computing. The case study was conducted to assess how the HBP recognises and deal with ethical concerns relating to the use of SIS in human brain research. To under-stand some of the ethical implications of using SIS in human brain research, data was collected through a document review and three semi-structured interviews with partic-ipants from the HBP. Results from the case study indicate that the main ethical concerns with the use of SIS in human brain research include privacy and confidentiality, the security of personal data, discrimination that arises from bias and access to the SIS and their outcomes.
Furthermore, there is an issue with the transparency of the processes that are involved in human brain research. In response to these issues, the HBP has put in place different mechanisms to ensure responsible research and innovation through a dedicated pro-gram. The paper provides lessons for the responsible implementation of SIS in research, including human brain research and extends some of the mechanisms that could be employed by researchers and developers of SIS for research in addressing such issues
Electronic Employment Eligibility Verification: Franz Kafka's Solution to Illegal Immigration
In last summer's debate over immigration reform, Congress treated a national electronic employment eligibility verification (EEV) system as a matter of near consensus. Intended to strengthen internal enforcement of the immigration laws, electronic EEV is an Internet-based employee vetting system that the federal government would require every employer to use. Broad immigration reform failed before Congress thoroughly considered national EEV, but the lines of debate have been drawn. Advocates in Congress will try to attach a nationwide worker registration system to any immigration bill Congress considers, and the Bush administration recently announced steps to promote such a system.A mandatory national EEV system would have substantial costs yet still fail to prevent illegal immigration. It would deny a sizable percentage of law-abiding American citizens the ability to work legally. Deemed ineligible by a database, millions each year would go pleading to the Department of Homeland Security and the Social Security Administration for the right to work. By increasing the value of committing identity fraud, EEV would cause that crime's rates to rise. Creating an accurate EEV system would require a national identification (ID) system, costing about $20 billion to create and hundreds of millions more per year to operate. Even if it were free, the country should reject a national ID system. It would cause law-abiding American citizens to lose more of their privacy as government records about them grew and were converted to untold new purposes. "Mission creep" all but guarantees that the federal government would use an EEV system to extend federal regulatory control over Americans' lives even further
Security Evaluation of Support Vector Machines in Adversarial Environments
Support Vector Machines (SVMs) are among the most popular classification
techniques adopted in security applications like malware detection, intrusion
detection, and spam filtering. However, if SVMs are to be incorporated in
real-world security systems, they must be able to cope with attack patterns
that can either mislead the learning algorithm (poisoning), evade detection
(evasion), or gain information about their internal parameters (privacy
breaches). The main contributions of this chapter are twofold. First, we
introduce a formal general framework for the empirical evaluation of the
security of machine-learning systems. Second, according to our framework, we
demonstrate the feasibility of evasion, poisoning and privacy attacks against
SVMs in real-world security problems. For each attack technique, we evaluate
its impact and discuss whether (and how) it can be countered through an
adversary-aware design of SVMs. Our experiments are easily reproducible thanks
to open-source code that we have made available, together with all the employed
datasets, on a public repository.Comment: 47 pages, 9 figures; chapter accepted into book 'Support Vector
Machine Applications
Kentucky\u27s PRISM-Based Automated Ramp Screening System Evaluation
In 2010, Kentucky implemented a Performance Registration Information Systems and Management (PRISM) based automated ramp screening system (PARSS) at the Boone County inspection station on southbound I-71. The purpose of the PARSS is to identify and screen every vehicle that enters the Boone County inspection station. The system provides automated screening of trucks based on the license plate number and the USDOT number displayed on the vehicle. If it is determined that the vehicle should be stopped for inspection, that decision is communicated to the truck driver via the existing directional arrows that direct drivers to the static scale for inspection.
A thorough evaluation was conducted to assess the performance of the system (i.e., does it do what it was intended to do?), the value of the system in identifying vehicles for inspection with PRISM or CVISN-related issues, and the potential for more widespread deployment of this type of screening system. In addition, the evaluation also included a side-by-side comparison of the two automated license plate reader (ALPR) systems
Shattered Families: The Perilous Intersection of Immigration Enforcement and the Child Welfare System
Examines how systemic biases in government practices, lack of legal protections, and limited expertise on the part of child welfare services exacerbate the trauma of separation following parents' detention and deportation and prevent family reunification
Water Rights and Water Allocation: Issues and Challenges for Asia
The primary audience for this report is management and staff working in water resources agencies in Asia, particularly those in river basin organizations (RBOs) in their various forms. The roles and responsibilities of RBOs vary considerably and are evolving as pressureson water resources are becoming more severe. Although this report seeks to share knowledge about the fundamentals and application of waterrights and allocation, it attempts to do so with a practical focus
- …