16,071 research outputs found
Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier
As universities recognize the inherent value in the data they collect and
hold, they encounter unforeseen challenges in stewarding those data in ways
that balance accountability, transparency, and protection of privacy, academic
freedom, and intellectual property. Two parallel developments in academic data
collection are converging: (1) open access requirements, whereby researchers
must provide access to their data as a condition of obtaining grant funding or
publishing results in journals; and (2) the vast accumulation of 'grey data'
about individuals in their daily activities of research, teaching, learning,
services, and administration. The boundaries between research and grey data are
blurring, making it more difficult to assess the risks and responsibilities
associated with any data collection. Many sets of data, both research and grey,
fall outside privacy regulations such as HIPAA, FERPA, and PII. Universities
are exploiting these data for research, learning analytics, faculty evaluation,
strategic decisions, and other sensitive matters. Commercial entities are
besieging universities with requests for access to data or for partnerships to
mine them. The privacy frontier facing research universities spans open access
practices, uses and misuses of data, public records requests, cyber risk, and
curating data for privacy protection. This paper explores the competing values
inherent in data stewardship and makes recommendations for practice, drawing on
the pioneering work of the University of California in privacy and information
security, data governance, and cyber risk.Comment: Final published version, Sept 30, 201
Cyber-crime Science = Crime Science + Information Security
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions
Bulletin of Information 1985-1986
Annual bulletin with academic calendar, school objectives & course of studies, faculty, administration, degrees conferred, course descriptions, fees & tuition, financial assistance, admission requirements, affirmative action policy, academic regulations, examinations & grades, student organizations, Alumni Associationhttps://ir.lawnet.fordham.edu/bulletins/1079/thumbnail.jp
Library Trends 40 (2) 1991: Ethics and the Dissemination of Information
published or submitted for publicatio
Library Trends 39 (1-2) 1991: Intellectual Freedom
published or submitted for publicatio
Identifying the limits of governmental interference with on-line privacy
This thesis addresses the issue of on-line privacy, in an effort to identify the limits of
governmental interference with this kind of right. Traditional privacy has been a well
accepted and legally recognized human right for many years now. However, the exposure of
privacy to the Internet has created new threats that mould the nature of 'on-line privacy': a
user is less aware of the dangers faced in cyberspace, due to the instinctive feeling of being
alone when in front of a computer; the distinction between private and public places is
blurred, cyberspace looks like a public space, but is actually an aggregation of privately
owned digital spaces, open to public access. Taking this as a basis, the thesis explores the
route to be followed in order for a well-balanced interference with on-line privacy to be
designed. First, an analysis of computer-related crime, the major reason (or excuse) on which
governments base the need to interfere and delimit privacy in the on-line environment. On¬
line delinquency may be a serious problem, but it has to be examined closer than it has been
up to present if it is to choose effective measures to combat it. Second, the thesis analyses the
legal reasons justifying governmental interference with on-line privacy. National security,
public safety and the economic well being of a country are the most popular reasons
appearing in laws regulating interference with an otherwise protected right, and they will
play a prominent role in justifying interference with privacy in cyberspace; an approach on
the meaning, use and difficulties met in their application can be a starting point in an effort to
avoid the same problems in the on-line environment. The European Convention of Human
Rights, being one of the most complete and effective legal forums for human rights
protection, is then used to show how the legally acceptable justifications for interference with
privacy are being implemented. The thesis goes on to examine cryptography: being one of the
most valuable tools for the protection of on-line privacy, regulating its use and dissemination
is a way of governmental interference. An approach of the efforts made to limit the use and
dissemination of strong encryption shows how on-line privacy has been affected. It is further
suggested that restrictions in the use of strong encryption have a much more detrimental
effect for legitimate users than for those using it to conceal illegal activity. The effectiveness
of these measures is, therefore, under question. Next, the UK Regulation of Investigatory
Powers Act 2000 is analysed, mainly those parts that affect on-line privacy. RIPA regulates
the use of investigatory powers in the on-line environment such as interception of
communications, acquisition of communications data and governmental access to keys.
Being one of the few examples of such legislation, a lot can be learnt from the mistakes
made. Last, the thesis explores the threat posed to on-line privacy by systems of covert
governmental surveillance. The Echelon and other major international surveillance systems is
probably the most real threat for privacy in the on-line environment
Emoji Company GmbH v Schedule A Defendants
Declaration of Dean Eric Goldma
- …