78,089 research outputs found

    UN Global Pulse: Annual Report 2013

    Get PDF
    Through public-private partnerships, innovative analysis and the development of open-source methodologies, Global Pulse is strengthening public sector capacity to leverage digital Big Data for development and resilience. This report provides a brief overview of advances made during 2013

    Asia-Pacific cyber insights

    Get PDF
    This report aims to give insight into the wealth of cyber perspectives across the Asia–Pacific and amplify the regional voice on the key themes and questions of the Global Conference on CyberSpace 2015 in April 2015. Overview The Asia-Pacific region incorporates some of the most mature cyber actors in the world as well as some of the least connected. Governments throughout the region are becoming increasingly aware of the importance of cyberspace, however the capabilities, needs, and priorities of each state lie across a wide spectrum. Asia–Pacific cyber perspectives are far more diverse and dynamic than the dominant narratives coming from the ‘cyber great powers’ and it is important that the region’s distinct voices are heard in international cyber discussions. This report aims to give insight into the wealth of cyber perspectives across the Asia–Pacific and amplify the regional voice on the key themes and questions of the Global Conference on CyberSpace 2015 (GCCS) in April 2015. To achieve this the Australian Strategic Policy Institute’s International Cyber Policy Centre partnered with the Institute of Strategic & International Studies Malaysia to host a multistakeholder workshop to gather and collate the expertise of a broad cross-section of Asia–Pacific cyber experts. With generous support from the Ministry of Foreign Affairs of the Kingdom of the Netherlands, the workshop brought together participants from government, the private sector, academia, think tanks, non-governmental organisations (NGOs), as well as regional and international organisations from 12 Asia–Pacific countries. The report represents a collation of the thoughts and perspectives from the workshop and subsequent discussions. It is based on the key themes and questions of the GCCS and structured around the GCCS agenda. The intention was not to achieve consensus but instead accurately portray the points of convergence and divergence across the region. Throughout the process the recurring themes of clarity, capacity, and responsibility emerged as ways to ensure a more reliable, secure, and stable cyberspace. The findings of this effort will be presented at an Asia-Pacific Borrel, an official side-event of the GCCS

    The NLRB’s Social Media Guidelines a Lose-Lose: Why the NLRB’s Stance on Social Media Fails to Fully Address Employer’s Concerns and Dilutes Employee Protections

    Get PDF
    [Excerpt] The expanding use of both personal and professional social media sites has resulted in its growing impact in the workplace. Recently, many examples have emerged where an individual’s use of social media for communicating frustrations or sharing personal information resulted in significant conflict between the individual and their employer. Employment actions arising from an employee’s social media use have become so contentious that a number of employers have been charged with unfair labor practices for overly broad social media policies or implementation of unfair policies. Following several important Board decisions the NLRB issued guidelines, identifying acceptable employer-initiated social media policies. As social media’s popularity will likely only continue to grow, it is important to understand how employer policies impact employees’ social media use and the potential invasion these policies may have on employees’ rights. This article concludes that the NLRB’s issued guidance fails to adequately address social media concerns raised by employers and dilutes employees’ rights to communicate workplace concerns. This is because even though the guidance permits employer developed social media policies, the NLRB’s stance permits employers to monitor and analyze employees’ social media use and does not clarify when an employer can act on social media information

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    Children, family and the state : revisiting public and private realms

    Get PDF
    The state is often viewed as part of the impersonal public sphere in opposition to the private family as a locus of warmth and intimacy. In recent years this modernist dichotomy has been challenged by theoretical and institutional trends which have altered the relationship between state and family. This paper explores changes to both elements of the dichotomy that challenge this relationship: a more fragmented family structure and more individualised and networked support for children. It will also examine two new elements that further disrupt any clear mapping between state/family and public/private dichotomies: the third party role of the child in family/state affairs and children's application of virtual technology that locates the private within new cultural and social spaces. The paper concludes by examining the rise of the 'individual child' hitherto hidden within the family/state dichotomy and the implications this has for intergenerational relations at personal and institutional levels

    Privacy in Gaming

    Get PDF
    Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers. After objectively selecting and analyzing major players in gaming, the research notes the many different ways that game companies collect data from users, including through cameras, sensors, microphones, and other hardware, through platform features for social interaction and user-generated content, and by means of tracking technologies like cookies and beacons. The paper also notes how location and biometric data are collected routinely through game platforms and explores issues specific to mobile gaming and pairing with smartphones and other external hardware devices. The paper concludes that transparency as to gaming companies’ data practices could be much improved, especially regarding sharing with third party affiliates. In addition, the research considers how children’s privacy may be particularly affected while gaming, determining that special attention should be paid to user control mechanisms and privacy settings within games and platforms, that social media and other interactive features create unique privacy and safety concerns for children which require gamer and parent education, and that privacy policy language is often incongruent with age ratings advertised to children and parents. To contribute additional research value and resources, the paper attaches a comprehensive set of appendices, on which the research conclusions are in part based, detailing the technical specifications and privacy policy statements of popular games and gaming platforms for mobile gaming, console gaming, and virtual reality devices
    • …
    corecore