78,089 research outputs found
UN Global Pulse: Annual Report 2013
Through public-private partnerships, innovative analysis and the development of open-source methodologies, Global Pulse is strengthening public sector capacity to leverage digital Big Data for development and resilience. This report provides a brief overview of advances made during 2013
Recommended from our members
MCTs and universities: new risks, new visibilities and new vulnerabilities
Universities have long used new technologies to enhance teaching but mobile communication technologies (MCTs) are posing new ethical and policy challenges. The capture functions on MCTs bring considerable benefits in terms of a student being able to play back and review what was said in the teaching rooms. However, the convergence and connectivity of web 2.0 and its successors add new, as yet largely uncharted dimensions. It not only extends the classroom but also renders previously bounded teaching and residential spaces porous as anybody who has access to these rooms and a MCT can capture and open to outside scrutiny what previously would have been relatively private spaces. This has contradictory ethical implications. Abuses of power and indiscretions can be held to account before wider public opinion. However, the capture and dissemination of sensitive personal information in the form of the opinions, beliefs and ideas of students and staff can expose individuals to risk. Furthermore, the technologies also enable acceptable content to be edited and/or reformed into mashups that may not be intended to be malicious but have the potential for reputational damage. This paper explores these issues first in terms of a range of events and incidents that highlight new vulnerabilities and visibilities. It then outlines some of the policy responses in the United States in terms of cyberbullying; in the UK under data protection; and the implications of a proposed new EU directive. However, it argues, that the fundamental limitation with all of these is that ultimately the institution does not own the device and therefore its control of how it is used is limited. The paper concludes with some preliminary findings on how a handful of British universities are adopting a proactive response here
Asia-Pacific cyber insights
This report aims to give insight into the wealth of cyber perspectives across the Asia–Pacific and amplify the regional voice on the key themes and questions of the Global Conference on CyberSpace 2015 in April 2015.
Overview
The Asia-Pacific region incorporates some of the most mature cyber actors in the world as well as some of the least connected. Governments throughout the region are becoming increasingly aware of the importance of cyberspace, however the capabilities, needs, and priorities of each state lie across a wide spectrum. Asia–Pacific cyber perspectives are far more diverse and dynamic than the dominant narratives coming from the ‘cyber great powers’ and it is important that the region’s distinct voices are heard in international cyber discussions.
This report aims to give insight into the wealth of cyber perspectives across the Asia–Pacific and amplify the regional voice on the key themes and questions of the Global Conference on CyberSpace 2015 (GCCS) in April 2015. To achieve this the Australian Strategic Policy Institute’s International Cyber Policy Centre partnered with the Institute of Strategic & International Studies Malaysia to host a multistakeholder workshop to gather and collate the expertise of a broad cross-section of Asia–Pacific cyber experts. With generous support from the Ministry of Foreign Affairs of the Kingdom of the Netherlands, the workshop brought together participants from government, the private sector, academia, think tanks, non-governmental organisations (NGOs), as well as regional and international organisations from 12 Asia–Pacific countries.
The report represents a collation of the thoughts and perspectives from the workshop and subsequent discussions. It is based on the key themes and questions of the GCCS and structured around the GCCS agenda. The intention was not to achieve consensus but instead accurately portray the points of convergence and divergence across the region. Throughout the process the recurring themes of clarity, capacity, and responsibility emerged as ways to ensure a more reliable, secure, and stable cyberspace.
The findings of this effort will be presented at an Asia-Pacific Borrel, an official side-event of the GCCS
The NLRB’s Social Media Guidelines a Lose-Lose: Why the NLRB’s Stance on Social Media Fails to Fully Address Employer’s Concerns and Dilutes Employee Protections
[Excerpt] The expanding use of both personal and professional social media sites has resulted in its growing impact in the workplace. Recently, many examples have emerged where an individual’s use of social media for communicating frustrations or sharing personal information resulted in significant conflict between the individual and their employer. Employment actions arising from an employee’s social media use have become so contentious that a number of employers have been charged with unfair labor practices for overly broad social media policies or implementation of unfair policies. Following several important Board decisions the NLRB issued guidelines, identifying acceptable employer-initiated social media policies. As social media’s popularity will likely only continue to grow, it is important to understand how employer policies impact employees’ social media use and the potential invasion these policies may have on employees’ rights.
This article concludes that the NLRB’s issued guidance fails to adequately address social media concerns raised by employers and dilutes employees’ rights to communicate workplace concerns. This is because even though the guidance permits employer developed social media policies, the NLRB’s stance permits employers to monitor and analyze employees’ social media use and does not clarify when an employer can act on social media information
From Social Data Mining to Forecasting Socio-Economic Crisis
Socio-economic data mining has a great potential in terms of gaining a better
understanding of problems that our economy and society are facing, such as
financial instability, shortages of resources, or conflicts. Without
large-scale data mining, progress in these areas seems hard or impossible.
Therefore, a suitable, distributed data mining infrastructure and research
centers should be built in Europe. It also appears appropriate to build a
network of Crisis Observatories. They can be imagined as laboratories devoted
to the gathering and processing of enormous volumes of data on both natural
systems such as the Earth and its ecosystem, as well as on human
techno-socio-economic systems, so as to gain early warnings of impending
events. Reality mining provides the chance to adapt more quickly and more
accurately to changing situations. Further opportunities arise by individually
customized services, which however should be provided in a privacy-respecting
way. This requires the development of novel ICT (such as a self- organizing
Web), but most likely new legal regulations and suitable institutions as well.
As long as such regulations are lacking on a world-wide scale, it is in the
public interest that scientists explore what can be done with the huge data
available. Big data do have the potential to change or even threaten democratic
societies. The same applies to sudden and large-scale failures of ICT systems.
Therefore, dealing with data must be done with a large degree of responsibility
and care. Self-interests of individuals, companies or institutions have limits,
where the public interest is affected, and public interest is not a sufficient
justification to violate human rights of individuals. Privacy is a high good,
as confidentiality is, and damaging it would have serious side effects for
society.Comment: 65 pages, 1 figure, Visioneer White Paper, see
http://www.visioneer.ethz.c
Children, family and the state : revisiting public and private realms
The state is often viewed as part of the impersonal public sphere in opposition to the private family as a locus of warmth and intimacy. In recent years this modernist dichotomy has been challenged by theoretical and institutional trends which have altered the relationship between state and family. This paper explores changes to both elements of the dichotomy that challenge this relationship: a more fragmented family structure and more individualised and networked support for children. It will also examine two new elements that further disrupt any clear mapping between state/family and public/private dichotomies: the third party role of the child in family/state affairs and children's application of virtual technology that locates the private within new cultural and social spaces. The paper concludes by examining the rise of the 'individual child' hitherto hidden within the family/state dichotomy and the implications this has for intergenerational relations at personal and institutional levels
Privacy in Gaming
Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.
After objectively selecting and analyzing major players in gaming, the research notes the many different ways that game companies collect data from users, including through cameras, sensors, microphones, and other hardware, through platform features for social interaction and user-generated content, and by means of tracking technologies like cookies and beacons. The paper also notes how location and biometric data are collected routinely through game platforms and explores issues specific to mobile gaming and pairing with smartphones and other external hardware devices.
The paper concludes that transparency as to gaming companies’ data practices could be much improved, especially regarding sharing with third party affiliates. In addition, the research considers how children’s privacy may be particularly affected while gaming, determining that special attention should be paid to user control mechanisms and privacy settings within games and platforms, that social media and other interactive features create unique privacy and safety concerns for children which require gamer and parent education, and that privacy policy language is often incongruent with age ratings advertised to children and parents. To contribute additional research value and resources, the paper attaches a comprehensive set of appendices, on which the research conclusions are in part based, detailing the technical specifications and privacy policy statements of popular games and gaming platforms for mobile gaming, console gaming, and virtual reality devices
- …